The Internet of Things (IoT) is poised to become the biggest technological breakthrough of this decade. Many households will soon own a smart car, smart refrigerator, and smart thermostat. In the business world IoT is also here and is steadily gaining additional profile and credibility. With that comes a vastly complex IoT ecosystem. 51% of surveyed IT and business decision makers report that their organization uses IoT devices that have been created by a third-party.
We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in a large enterprise or an organization that uses unique equipment for business functions it’s almost impossible to follow the “patch all the things” mantra. Mostly, because there aren’t available patches or the systems have become unsupported. At CCSI we work with some of the world’s largest organizations and in doing so we’ve noticed that patching isn’t always an option, even though we recommended it as a priority, to some systems on the network. Here are few areas we recommend when patching isn’t an option.
DevOps is helping organizations develop software faster. DevOps is a software development approach that utilizes the Agile methodology to integrate and streamline the development and operations process. The result is a faster and more efficient development process.
The more people you share an internet connection with, the more vulnerable you are to data theft. That is why it is always safe to browse the internet from home or at the workplace where the networks are uncongested and secure. But you cannot hide in this comfort zone forever; you will occasionally need to use public internet such as a coffee shop or airport Wi-Fi. When that happens, how do you secure your data? Please read on to discover 5 tips on how to stay safe while using airport Wi-Fi.
In our modern age, it is natural to want to modernize your business in order to keep up with the times and keep customers interested, so investing in the cloud can often seem like a natural pathway for changing businesses, but it does come with some risks. Not paying attention to the very real risks of compromising cloud security – which can seem like a faraway, non-important issue – can cost you greatly, and, at worst, could ruin your business. Customers put their trust in you to keep them and their data safe, so compromising that can be the absolute faux par, which will destroy your business’ reputation and ensure that no future success can be enjoyed. But enough with the fear-mongering: how can you stop these security slips ever happening in the first place? Knowledge is your best tool, so knowing about the dangers often prevents them from becoming issues.
Recently, ransomware attacks have been on the increase in school districts nationwide and there are no signs of it slowing up. This is happening because school systems typically suffer from a smaller IT staff, older equipment and less-than-optimal cybersecurity expertise. For cyber criminals, schools are becoming the low hanging fruit for theft.
Open-source software is a great way to add proven functionality to your application, but it comes with risks in the form of software vulnerabilities. If you are using open-source components (and with all likelihood you are), it is important to keep track of new vulnerabilities as they are discovered, so you can upgrade to the latest, patched-up version of the software.
One tool you can use to keep track of open-source vulnerabilities is the list provided by the Open Web Application Security Project (OWASP), which was last updated in 2017. The OWASP Top 10 covers the most critical security risks for web applications.
The following tips should help you protect your software against the OWASP Top 10 vulnerabilities.