Hanging on the Telephone
One of the key areas many companies overlook when it comes to information security is their phone system. Not only will a compromised phone system provide a hacker with the ability to eavesdrop on company confidential information or to disrupt your communications by reconfiguring the system, but it can also cost a company a lot of money. […]
Business Blogging Podcast
Krishna De, one of the other business blogging finalists in the Irish Blog Awards, organised a podcast today where all the finalists in the business blogging category took part. We talked about the benefits blogging can bring to your organisation and what things you should think about if you are considering jumping into the business blogosphere. It was a […]
Anatomy of an Attack
An interesting article recently appeared on informit.com. It uses a fictional company as an example on how corporate information security defences can be breached. The article, How to Steal 80,000 Identities in One Day, goes through the various stages of an attack, including reconnaissance, identifying the weakest link and exploiting it. While it is a fictional […]
Update on TK Maxx Hack
Some more information on the TJX Hack. It now looks like the attack happened earlier than expected and TJX have admitted that it is quite possible Irish shoppers at the TK Maxx shops have been compromised. The Register and The Washington Post have details on the story. Irish customers concerned about their details can call […]
SPAM, SPAM, SPAM
Like all Blogs we have to contend with a certain proportion of comment SPAM. For those of you not aware of what comment SPAM is, it is basically where people try to promote their site(s) by adding comments to posts with links to their site(s). These comments never have anything relevant to say about the […]
Irish CyberCrime Survey 2006 Released
The Irish Chapter of the Irish Information Systems Security Association and University College Dublin’s Center for Cybercrime Investigation recently released the results of the first comprehensive survey on the impact on cybercrime on companies and organisations in Ireland, the Irish CybercrimeSurvey 2006. This is a significant event for those of us working in the Information […]
Security Watch Shortlisted for Best Business Blog
Much to our surpise and delight we found out this evening that our Security Watch Blog has been shortlisted in the Best Business Blog category for the final of the Irish Blog Awards 2007. We are very grateful to all who voted for our Blog, especially given the quality of other Blogs that are in the […]
PC Fooone Hoooome
I came across an interesting story today about how technology for one purpose can be used for another. The SETI project is where people use the spare CPU cycles on their PC in a collaborative search for extra-terrestrial live. One of the project members was highly distraught when his wife’s laptop was stolen. I am sure […]
The Folly of Youth
As part of Safer Internet Day organised by Insafe and which BH Consulting supported, a survey was conducted on how young people protect their privacy online. The results of that survey shows over half of those surveyed do not protect their privacy when online. This is worrying as these people are exposing themselves to many risks, not least […]
Pure Mule
A number of people have asked me to explain how the mule scam works. Mule scams are named after the drug mules used in drug smuggling. The basis of the scam is that criminals need to transfer money they have fraudulently gained from Phishing scams etc. to their own bank accounts. The criminals need this […]