Call us at 507.319.5206 or This email address is being protected from spambots. You need JavaScript enabled to view it.
Follow us on LinkedIn and Twitter

Botz Security Bytes Newsletter — December 2014

BOTZ

 


 SECURITY BYTES


   Solving information security problems                            December 2014

Home     |      SSO Services      |      Security Consulting      |       Downloads     |      Contact      

Holly




Happy Holidays!

 




The 5 Must-Knows for Effective

Info Security Management


CONSEQUENCESDecember 10, 2014 — It’s a simple fact. Good security doesn’t just happen. You need to have a very specific set of knowledge to effectively secure your information assets.

 

The knowledge you need falls into five discrete categories: policies, data, people, systems, and events.

 

Lack of information in these categories can have many consequences – all of them bad.....

 

Read more...



 

US Power Grid Vulnerabilities:

‘It’s too risky’ is too risky!


CAUTION: RANT ALERT


Ignorance is NOT bliss!On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement.

 

He said that China and one or two other countries have the capability to launch a cyber attack that could successfully shut down parts of the US power grid.

 

What’s the real problem behind this sorry state of security — not just in the industrial sector, but across broad swaths of the entire economy?......

 

Read more...

 



Not your copy? 
Don't miss an issue!  Subscribe here... 


  

 

SSO IN A DAY

In this 1-hour on-demand webinar, learn to overcome the complexities of SSO with a fresh "managed services" approach that brings single sign-on within easy reach of nearly any organization.
Watch the webinar...

 

Top Security News


Facebook Embraces Tor 

Ironic! A Tor-enabled browser lets you search the web anonymously without being tracked by anyone (even, supposedly, the NSA). Now Facebook — often criticized for the way it uses your private information — is enabling access in a way that prevents others from misusing your private data! 
Read more...


 

Setting Traps, and Other Internet Security Tips
This MIT Technology Review article says that, with internet security broken, we should use two-factor authentication, assume a compromise will happen and rethink our approach to Internet security.

Read more...


 

Stealthy Regin Malware is a 'Top-tier Espionage Tool'
Used for long-term spying on governments, companies and individuals, Regin's behavior suggests it was created by a nation-state.

Read more...


 

Sony Hack 'Unprecedented, Damaging and Unique'
An overview of the Sony hack. Disturbing.
Read more...
 

 

BOTZ & Associates, Inc.    |    Rochester, MN 55903    |    1.507.319.5206    |    This email address is being protected from spambots. You need JavaScript enabled to view it.