<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Heartbleed: Here's What You Need to Know

Posted by Cathie Briggette on Fri, May 09, 2014

HeartBleed-3Almost two weeks ago the world was made aware of the worst internet security breach known to man—Heartbleed. What makes this the worst security breach? Well the answers is that Heartbleed has been infecting numerous websites and laptops of major companies, as well as known websites, and you—the end user. This has been going on for the past two years. HeartBleed created a weakness that allowed the stealing of information protected under normal conditions. Heartbleed was able to accomplish all of this by overriding the encryption code used by many websites and was virtually undetected. The websites that were (or are) most likely to be victims use open-source tools called Open SSL—which provides most of the modern web of SSL (Secure Sockets Layer) and Transport Layer Security (TLS) functionality. SSL/TLS are a set of protocols that provide security for internet communication—it encrypts the data being communicated between two (or more) internet users.

Read More

Topics: Disaster Recovery, Data Security

Heartbleed: Here's What You Need to Know

Posted by Ola Owojori on Tue, Apr 29, 2014

Almost two weeks ago the world was made aware of the worst internet security breach
known to man—Heartbleed. What makes this the worst security breach? Well the answers is that Heartbleed has been infecting numerous websites and laptops of major companies, as well aheartbleed 2s known websites, and you—the end user. This has been going on for the past two years. HeartBleed created a weakness that allowed the stealing of information protected under normal conditions.  Heartbleed was able to accomplish all of this by overriding the encryption code used by many websites and was virtually undetected. The websites that were (or are) most likely to be victims use open-source tools called Open SSL—which provides most of the modern web of  SSL (Secure Sockets Layer) and Transport Layer Security  (TLS) functionality. SSL/TLS are a set of protocols that provide security for internet communication—it encrypts the data being communicated between two (or more) internet users.

Read More

Topics: Disaster Recovery, Data Security

Heartbleed. Security Risk

Posted by Cathie Briggette on Fri, Apr 11, 2014

4/11/2014 4:52 PM

Read the NEW UPDATE: From Mashable

Read More

Topics: Disaster Recovery, Managed Services

IT Security: Endangered Species and Hackers, An Unlikely Pairing

Posted by Ola Owojori on Thu, Apr 03, 2014

WWF

What’s the first thing that pops into your head when you hear the word “hacker”? Is it fraud, or identity thief, Anonymous, or The Girl With the Dragon Tattoo?  Well any of the answers above are probably correct; perhaps except for the last one. Now what’s the thing that pops into your head when you hear “endangered species”? Is it elephants, rhinos, tigers, poachers, or the black market? Once again all of the above are correct!

Now, based on the answers above for hackers
and endangered species, it can be inferred that there is no relationship between the two. Endangered species and hackers are two completely different things in two separate worlds. Unfortunately, that assumption is wrong -- in today’s world of advance technology there is a connection between the two, more specifically hackers and poachers have created an asymmetric warfare.

Read More

Topics: Disaster Recovery, Data Security

A Conversation with Laura M. Bennett, CFO, Clark & Lavey Benefits Solutions

Posted by Cathie Briggette on Tue, Dec 17, 2013

 

Laura M Bennet, CRO at Clark Employee benefits represent one of the largest expenses for any company and can be unwieldy to manage. Clark & Lavey, leading benefits solutions broker and consultancy to businesses throughout New England, helps clients negotiate the best benefits at the lowest cost, save time, stay compliant, boost productivity, and keep employees happy.

Read More

Topics: Disaster Recovery, Managed Services