Every day we hear new stories about data breaches and cyber threats. Medium to large companies are starting to see information security as an essential part of their operations. While some are still taking a reactive and piecemeal approach, others are starting to understand that a comprehensive risk management program is needed. Information security threats[…]
So, you have spent time and thinking to create a strong password. It is composed of many characters, letters, numbers and symbols. You think that it is undiscoverable unless somebody tortures you to death… Well, all this clever diligence goes up in smoke if you use your password on an online service that stores it[…]
We started using the Internet 20 years ago and 20 years ago the landscape of online services was very different to what it is now. No Facebook, Twitter, Gmail or even Google. There was AOL, Netscape, Hotmail, then later MySpace and plenty of other services that may still exist, but that most of us don’t[…]
Last week, I received a password protected Excel spreadsheet. This spreadsheet was used as a survey-style questionnaire. I could view but not edit the questions. I could only enter answers in some specific “response” cells. No other cells were available for editing. I could also see that some columns had been hidden. I could not unhide them.
Our computers contain professional and personal information, some of which is sensitive. This information can include social security numbers, credit card details and sometimes even passwords. We may also store client contracts, project reports and confidential client information on our laptops. Many of us believe that this information is secure. But this is dangerously wrong. In fact,[…]