Posted on 13th Nov 2012 by Ray Wizbowski
Security or convenience? It’s an age-old question in the security world. But in parts of the USA people like you or me can have easy access to both. As part of our mini-series on Digital USA, I want to take a look at automotive innovation and how digital technology is transforming the transport industry to [...]
Posted on 7th Feb 2012 by Ray Wizbowski
Is the health of your health records at risk? In our quest to make personal health data easily available to medical professionals and reduce the number of paper files, many countries have mandated the use of electronic medical records (EMR). The challenge is that these records are typically not well protected leaving the door wide [...]
Posted on 10th Jan 2012 by Ray Wizbowski
If you were on Twitter on 9th January during CES 2012 at the time of the Intel press conference you would have seen the Twittersphere explode following the unveiling of Intel’s new ultrabook. That wasn’t the reason for all the tweets, however swanky the ultrabook looks and feels. The reason, in my view, is that [...]
Posted on 10th Oct 2011 by Ray Wizbowski
How do we keep our online identities and data secure? Turning to strong authentication is a critical step in preventing data breaches and can be accomplished for little cost.
Posted on 29th Sep 2011 by Ray Wizbowski
Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?
Posted on 22nd Aug 2011 by Ray Wizbowski
In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best [...]
Posted on 19th Aug 2011 by Ray Wizbowski
As reported by @gcluley on Naked Security this week, a suspected fraudster has been charged with attempting to steal thousands of pounds from his neighbours’ online bank accounts. What makes this story particularly interesting (and also worrying) is the way in which this criminal went about gathering the information which he then used to access [...]
Posted on 29th Jun 2011 by Ray Wizbowski
As an organization with security close to our heart I was pleased to learn last week that Microsoft has introduced smart card authentication with Outlook Anywhere, as reported by @PaulRobichaux. As more and more companies start to embrace remote working – to get the most out of their employees wherever they are and let them [...]
Posted on 16th Jun 2011 by Ray Wizbowski
Whether you like Ms Spears’ music or not, according to @forrester’s Marc Cecere, every business should strive to have someone overseeing the technologies and taking responsibility for the overall goal and destination.
Posted on 13th Jun 2011 by Ray Wizbowski
Fujitsu recently launched a biometric authentication technology which it claims can identify one individual out of data from a million people. Taking under two seconds to complete both fingerprint and palm vein recognition the system appears largely foolproof. But do we really need this level of biometrics?