Ace comedian Jimmy Kimmel, who is known for tickling our funny bones through his television shows, tried a social engineering experiment last week.
Passwords, King of Authentication: Long Live the King!
This post is a reproduction of an article I wrote that was originally published in Business Computing World . “When you play the Game of Thrones, you win or you die”. One thing that we have learnt from the popular TV show and books is that no one is safe on the throne for long before a younger, stronger, and more entitled claimant comes along to throw you off
Why MSPs Should Take Extra Care in Managing Client Passwords
Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness. Managed IT Service Providers (MSPs) deliver a variety of IT and network management services to their clients. In particular, small and medium organizations are increasingly relying on MSPs to manage part or all of their IT services
Fully Controlled and Closely Monitored Remote Access, a Critical Aspect of DCIM
Without proper data center remote access management, administrators invite security issues and waste time. With more organizations adopting cloud computing and virtualization, data center operations have been proliferating across the globe. This trend creates multiple challenges for data center administrators in IT organizations
The Heartbleed Bug: How to Mitigate Risks with Better Password Management
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – As the dust begins to settle down on the Heartbleed bug, it is time to critically assess the password management practices in your organization.
IT outsourcing: When outsiders become insiders, how do you ensure information security?
Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need to meet business demands quickly, and other critical aspects. Usually, tasks such as software development, network management, customer support, and data center management are outsourced
Media round up!
June saw some great coverage for ManageEngine. Here are some of the articles and interviews that were carried in leading publications
Beware, your social media password could let your business down!
Social Media emerges the most convenient platform for cyber-criminals; Using same password across social media and business applications makes your business vulnerable to attacks! Over 12 per cent of the world population is on social network and the number keeps growing exponentially. Those who do not own an account in Facebook or Twitter are now being viewed as those living in prehistoric times. No doubt, social media is wonderful in helping you stay connected with friends, but the sheer popularity of social media attracts the attention of cyber-criminals looking for ways to harvest identities.
Could Your Jewelry Stop Hackers?
Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.
6 mobile security screw-ups you’re (probably) guilty of
In two weeks, the security community will flock to San Francisco for this year’s RSA Conference. With two-thirds of Internet users now accessing the Internet via their mobile devices daily and mobile malware reportedly up over 185 percent in 2012 , the hottest topic on the docket is mobile security