ANX Corporate Blog: Posts tagged as security

Showing 21 through 25 of 33 total posts

Jun 23rd 2010, 13:23

Don't let your information get CAUGHT!

Posted by Kim Francisco
Over the past decade, a number of standards, laws and regulations have emerged that require organizations to provide strong security and privacy guarantees. The end result is high expectations when it comes to cyber security awareness and training, both of employees and customers. Take a look at this Anti-Phishing game. For those unfamiliar with the term, a phishing attack occurs when bait is used to “catch” financial information and passwords. This game brings awareness to the scam, while providing key warning signs of phishing scams. When a user falls for a simulated attack and clicks on the URL, PhishGuru takes advantage of the “teachable moment” in the form of a cartoon that offers steps to avoid falling for these

Comment BubbleComments (0)

Mar 9th 2010, 16:53

Security Trends - RSA 2010

Posted by Dennis Piche
ANX sent four delegates (including our CEO) to the RSA conference this year with learning in mind;  learning more about what our competition is up to, learning more about potential business partners, and learning more about emerging trends in security.  Here are some of my takeaways from the conference:
 
Attendance
According to Tom Heiser (of RSA) attendance was up 20% this year.  After a disappointing 2009 this is refreshing news and hopefully the sign of a recovering economy.
 
Themes
Cloud Security:  The Cloud Security Alliance put on a sold out show to kick off the conference on Monday.  Unfortunately I did not arrive in San Francisco until Monday afternoon but I heard they had to turn many away

Comment BubbleComments (0)

Feb 11th 2010, 09:21

Privacy Warning! Google Buzz Flaw

Posted by Barry Chapman
Maybe not as much a security threat as a privacy threat, but a recent article posted by Business Insider outlines a serious Privacy Flaw in their new application.
 

When you sign up to use Google Buzz, you are automatically set up with followers and people to follow, according to a spokesperson from Google. In all actuality, this is a great usability feature - until you get to the accessbility to your personal information. The people you follow, and the people that follow you are made publicly available to anyone who may happen to view your profile. This means that anyone could easily see the people you chat with and email most!
 
This claim was countered by Google, asking Business Insider to phrase this differently:
"In other words, after

Comment BubbleComments (0)

Jan 21st 2010, 11:48

Website Security and Page Speed

Posted by Barry Chapman
More changes are abound!
 
Security
 
I received a couple of comments over the weeks since the new site launched, primarily targeted at our web security practices. First and foremost, our management of user account information; with login process at a close second.
 
As a security company, we consider our website to serve as a representation of what we are, and the fact that anyone had to question these was really an eye opener. The first concern was ‘how do we manage our user account information?’ All user data is stored in a secure database within our datacenter. This data was initially collected via user registration over an unsecure connection (the second concern). Since we were not doing any transactions that

Comment BubbleComments (0)

Dec 21st 2009, 15:23

The Importance of Remote Access From Non-Company owned PCs

Posted by Glenn Moore
As I watched reports of the east coast getting hammered by the blizzard, I wondered how many employees wouldn't make it to work.  Events like this remind me how beneficial our PositivePRO Cloud-based remote access really is. 
 
It's widely accepted that remote access is still one of the best technologies to improve worker productivity.  Something to keep in mind when deploying remote access is that more and more individuals want to access company information from their own PC or laptop.   This is especially true of younger workers.  An increasing number of IT staffs recognize that supporting remote access from non-company issued devices is a requirement.  However, allowing such access presents unique

Comment BubbleComments (0)