Online music play concept pointing finger

Security, Part 12: How Avril Lavigne can ruin your business

October 25, 2017


McAfee recently conducted their 11th annual Most Dangerous Celebrities study with Avril Lavigne topping the list, followed by that scoundrel, Bruno Mars. OK, so neither of these celebrities are actually dangerous, but searching for gossip about them can be dangerous …

Categorized: Security

Group of Corporate People having a Meeting about Online Protection from Virus

Security, Part 11: Develop an IT recovery plan…or else

July 26, 2017


Here’s a crazy stat for you, courtesy of the Ponemon Institute: 90% of organizations that lose data due to a cyberattack wind up closing their doors in the following two years. We’ve spent a lot of time covering the various …

Categorized: Security

Computer screen with ransomware attack file encrypted alerts in red and a man in suit keying on keyboard in a dark room, ideal for online security and digital crime

Security, Part 10: WannaCry and next generation of ransomware

June 7, 2017


Last month, WannaCry ransomware infected over 350,000 computers in 150 countries, causing havoc across the healthcare industry. In an earlier article, we looked at how to avoid getting infected by ransomware like WannaCry. In light of this recent attack, we …

Categorized: Security

A waning sign for video cameras on a fence.

Security, Part 10: Your security cameras may be hacked

May 3, 2017


It’s pretty alarming. Right now, you can go to one of several websites and see live streams of hacked cameras. Offices, stores, warehouses, homes, bedrooms, baby monitors – there are thousands of unsecured cameras that have been hacked and are …

Categorized: Security

Download progress bar. Download Files Information Technology Sharing Concept.

Categorized: Security

Cyber security concept: Rear view of businessman standing on wooden floor with circuit board and padlock sketched (chalk drawing) on the wall.

Categorized: Security

Woman puts her finger on an icon of a house shown on the touch screen of a digital tablet. The tablet runs a smart home app. Concept of controlling wireless devices at home, also know as internet of things.

Security, Part 6: The Vulnerability of the Internet of Things

February 8, 2017


In early 2014, more than 100,000 Internet of Things (IoT) devices, including home appliances, were manipulated into sending 750,000 phishing emails over the course of about two weeks, waking the world up to a new threat. The IoT offers promise …

Categorized: Security

Password

Facility Security, Part Five: The Key to Creating Secure Passwords

January 25, 2017


Cybercrime is getting worse every year. One estimate claims that its impact on the world economy is as high as $15 trillion. In other articles, we’ve covered several forms of cybercrime, including ransomware, phishing, visual hacking, as well as threats …

Categorized: Security

Open hand with Internet of Things (IoT) word and icon on blue blur background, Technology concept.

Using the Internet of Things for smarter building use

December 28, 2016


By using smart sensor technology, facility managers can gauge how employees are using available spaces like conference rooms and common meeting spaces. Employee workspaces are increasingly relevant, given today’s trend of more workers making use of flexible work hours and …

Categorized: Security

Index finger touching a locked cloud icon that does link to three office worker symbols in blue. Four unlinked knowledge worker buttons remain gray. Business and technology metaphor. Cutout on white.

Facility Security, Part Four: Network Access Control

December 7, 2016


Mobile phones are everywhere, and the number and types of devices used by employees, customers, healthcare providers, patients, and visitors are growing at a rapid pace. While these devices can be crucial to the functioning of your facility, they are …

Categorized: Security