Security Challenges in 2012

Technology is always changing and adapting. So, regrettably, are cyber-criminals. MIT’s Technology Review website not long ago presented its list of the biggest technology security hazards of 2012. If you spend much of your life surfing the Internet or communicating with your friends through social media sites, you should be interested in this list. Learning what’s on it can protect you and your computer in 2012.

Stolen, Spoofed Certificates

One difficulty that the article discussed is stolen or faked certificates. When you log into a website, your bank for example, the traffic is encrypted with a “certificate”. This establishes that the site can be trusted. The faking and stealing of these certificates was a common strategy employed by cyber-criminals in 2011. This can allow them to have access to confidential information.

A Common Security Mechanism in Trouble?

Sites use certificates as a security measure more than any other means. If they are no longer considered trustworthy it might affect everyone, from the consumer, to the large company that is responsible for protecting your data.

Details

Internet Phishing Scams: Keeping Cyber Thieves Away from Your Small Business

Phishing scams are at the top of cyber criminals’ moneymaking lists. It’s disconcerting that the important data of organizations such as Sony are under threat from phishing scams. But unlike the widespread notion, these scams affect small enterprise owners as much as they affect the big corporations.

Over 300,000 complaints were filed in 2010 to the Internet Crime Complaint Center, a partnership between the National White Collar Crime Center and the FBI.  These complaints were from small businesses and individuals wronged by online phishing scams and a variety of other Internet related crimes.

Understanding what phishing is will help you identify what makes your small business so appealing to cyber criminals.

Details

How the Cloud Supports Creative Collaboration

Many industries have changed on account of the cloud. Massive quantities of information can be stored and shared easily in the cloud. And with the popularity of tablets people can access it quickly. This has improved the way creative people do business, below are a few examples if this.

Portfolios
You once had to carry heavy portfolios when meeting with clients.  Those portfolios were limited to the amount of work you could carry within. Portfolios, when stored in the cloud, are not limited to physical size. You can organize your past work into categories that fit the needs of different clients. By accessing your portfolio quickly on a tablet, you can share your work more easily and this can lead to more opportunities.

Details