SME Cyber Security
79.8K views | +10 today
Follow
SME Cyber Security
Your new post is loading...
Your new post is loading...
Scooped by Roger Smith
Scoop.it!

Are you willing to risk online security for tips to get the 'perfect summer body'?

Are you willing to risk online security for tips to get the 'perfect summer body'? | SME Cyber Security | Scoop.it
'If an offer seems too good to be true, it probably is,' says chief consumer security evangelist at Intel Security.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cybercrime Hit Businesses Hardest in 2015, says IC3 Report

Cybercrime Hit Businesses Hardest in 2015, says IC3 Report | SME Cyber Security | Scoop.it
Businesses were hit hardest by inbox-based scams in 2015 that robbed U.S. companies of $263 million.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyber warfare more dire and likely than nuclear

Cyber warfare more dire and likely than nuclear | SME Cyber Security | Scoop.it
The president has a well-thought-out protocol in the event of a nuclear attack, but nothing for a massive cyberattack.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

A Matter Of Digital Trust: Understand Your Security Risks And Fix Them Now

A Matter Of Digital Trust: Understand Your Security Risks And Fix Them Now | SME Cyber Security | Scoop.it
Cybersecurity analytics, application-aware firewalls, and real-time forensics are making it more difficult for hackers to succeed.
Roger Smith's insight:

"To respond to these new and persistent threats, organizations need to shift from a reactive, threat-oriented view to a more proactive, predictive approach. "


 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Millennials Could Learn From Baby Boomers When It Comes To Security

Millennials Could Learn From Baby Boomers When It Comes To Security | SME Cyber Security | Scoop.it
New reports show baby boomers have their millennial children beat when it comes to information security.
Roger Smith's insight:

Four paranoia finally paying off.   The digital natives have very little understanding of security and privacy.   

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

The Cybersecurity Industry's Big Blind Spot

The Cybersecurity Industry's Big Blind Spot | SME Cyber Security | Scoop.it
Today's threat actors are more focused, funded and disruptive than ever. But the cybersecurity defense industry is not built to respond appropriately, thought
Roger Smith's insight:

I agree with this article and especially this comment


"The major cybersecurity vendors are laser-focused on maintaining their brand, their image and their cultural persona,"


The major players are short sighted when it comes to areas outside their expertise.   We see it so often, the overall attitude that the digital criminal will not attack us from there! 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

10 tips for hybrid network-enabled security | Orange Business Services

10 tips for hybrid network-enabled security | Orange Business Services | SME Cyber Security | Scoop.it
Here are 10 tips to protect your data and infrastructure, while staying competitive in the digital world.
Roger Smith's insight:

"Here are 10 tips to help you build multi-layered security that protects your data and infrastructure"

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How to stop your phone from being hacked

How to stop your phone from being hacked | SME Cyber Security | Scoop.it
How to stop your phone from being hacked - Advices from a cyber forensics investigator https://t.co/2H4iypEVBX https://t.co/PseOj3Axia
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Is there life after antivirus? Looking to the future of endpoint protection | Information Age

Is there life after antivirus? Looking to the future of endpoint protection | Information Age | SME Cyber Security | Scoop.it
Many are moving away from antivirus solutions and embracing new technologies to protect their endpoints, but what's next after antivirus?
Roger Smith's insight:

What is the next step in detection and prevention of malware?  

more...
Ken Feltman's curator insight, May 25, 7:52 AM
Can we stay ahead of hackers?
Scooped by Roger Smith
Scoop.it!

Bad Botnets Threaten Security | PYMNTS.com

Bad Botnets Threaten Security | PYMNTS.com | SME Cyber Security | Scoop.it
Malicious botnets represent a threat to consumer security.
Roger Smith's insight:

Bad robot!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cybercrime on the rise as economic crime 'goes digital'

Cybercrime on the rise as economic crime 'goes digital' | SME Cyber Security | Scoop.it
Incidents of cybercrime are on the rise, with a new study from PwC reporting it as the “only economic crime to have registered an increase”.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Bank Of America Will Let You Withdraw Cash Using Android Pay At 5,000 ATMs By The End Of This Year

Bank Of America Will Let You Withdraw Cash Using Android Pay At 5,000 ATMs By The End Of This Year | SME Cyber Security | Scoop.it
Mobile payments are often viewed as a replacement for cash and cards. Why carry layers of bills and plastic in your wallet when you can simply make purchas... by Bertel King, Jr.
Roger Smith's insight:

Making it easy for consumers is constantly exposing them to the ability for them to be compromised.   I do not know the technology to be deployed but We already have card skimmers that look exacly like the real parts of the ATM's what to stop them putting a NFC reader in it as well.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How Social Media Jeopardizes Data Security

How Social Media Jeopardizes Data Security | SME Cyber Security | Scoop.it
Your employees may be revealing too much, here's how to keep their posts from compromising your business.
Roger Smith's insight:

In the 70's to the 90's social engineering was dumpster diving and going through the trash.   In the last 10 years the digital criminal has embraced social media as the go to area for personal information when conducting a social engineering attack.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Hackers Target SE Asian Banks, Revealing Campaign Against SWIFT Network

Hackers Target SE Asian Banks, Revealing Campaign Against SWIFT Network | SME Cyber Security | Scoop.it
Investigators are examining possible computer breaches at as many as 12 banks linked to SWIFT’s global payments network that have irregularities similar to those in the theft of $81 million from the Bangladesh central bank, according to a person familiar...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Your medical records are a gold mine for cybercriminals

Your medical records are a gold mine for cybercriminals | SME Cyber Security | Scoop.it
Some say privacy is an illusion. I hope that isn’t true, but I do know that our medical records are not safe.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Analytics Brief: Thwarting cyber crime on banks

Analytics Brief: Thwarting cyber crime on banks | SME Cyber Security | Scoop.it
Gottfried Leibbrandt, chief executive of the Society for Worldwide Interbank Financial Telecommunication (SWIFT), declared that he is going "on the offensive against cyber criminals." Wit
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

The 7 Worst Places for Downloading Windows Software

The 7 Worst Places for Downloading Windows Software | SME Cyber Security | Scoop.it
Software can be packed with bloatware and worse, malware. You can catch malware, if you download your tools from the wrong source. These are the sites you shoul
Roger Smith's insight:

This may sound sill but always download software from the manufacturers site and even then be very wary about it!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How to Hack the Hackers: The Human Side of Cyber Crime

How to Hack the Hackers: The Human Side of Cyber Crime | SME Cyber Security | Scoop.it
As cyber attacks grow ever more sophisticated, those who defend against them are embracing behavioral science and economics to understand both the perpetrators and their victims
Roger Smith's insight:

Interesting scenario!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

HPE Exec: How to Disrupt the Business of Hacking

HPE Exec: How to Disrupt the Business of Hacking | SME Cyber Security | Scoop.it
A Hewlett Packard Enterprise executive details how hacking now has an organized business model and suggests steps to make it less profitable for hackers.
Roger Smith's insight:

Securing your organisation better than the next one means that the automated systems conrolled by the script kiddies will target the lowest hanging fruit.


 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Mobile Device Security in the Workplace: 6 Key Risks & a Surprising Challenge

Mobile Device Security in the Workplace: 6 Key Risks & a Surprising Challenge | SME Cyber Security | Scoop.it
Employees aren't just bringing their mobile devices to the workplace—they're living on them. A recent study by Pew Research found that 44 percent of smartphone owners sleep with their...
Roger Smith's insight:

Recently played with this in a controlled manger but I was impressed how easy it was to compromise a smart device!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Public Wi-Fi Security – How to avoid this triple threat while surfing on the go – Digital Privacy | Cyber Security & Digital Forensics

Public Wi-Fi Security – How to avoid this triple threat while surfing on the go – Digital Privacy | Cyber Security &  Digital Forensics | SME Cyber Security | Scoop.it
RT @FreedomeVPN: Read how to avoid also the most dangerous public Wi-Fi hack, the pesky packet sniffer https://t.co/dNUuq3oZ8I https://t.co… | Cyber Security & Digital Forensics
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence | SME Cyber Security | Scoop.it
A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence.
Roger Smith's insight:

Sorry, but if someone finds a hole in an organisations digital security, informs the organisation of same hole and they do nothing for three years, the organisation is guilty.  


 


Yes the hacker did it wrong, but where is the culpability of the organisation in protecting  their assets.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Microsoft warns of malicious macros using a new sneaky trick

Microsoft warns of malicious macros using a new sneaky trick | SME Cyber Security | Scoop.it
Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick.
Roger Smith's insight:

Coming round again?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

A third bank was a victim of cyber heist that involved the SWIFT

A third bank was a victim of cyber heist that involved the SWIFT | SME Cyber Security | Scoop.it
The Ecuador Bank Banco Del Austro of Cuenca was hacked by threat actors that once again involved the SWIFT systems to stole $12 Million.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Anti-cyber crime chiefs want more businesses to report data attacks

Anti-cyber crime chiefs want more businesses to report data attacks | SME Cyber Security | Scoop.it
Headline Anti-cyber crime chiefs want more businesses to report data attacks
Roger Smith's insight:

When you report it you are then liable.   Being liable exposes the organisation to bigger risk that not reporting it.   Most SME base their decision on that risk.  


Working out that exposure to the risk in monitory value is what drives the reporting process.   Being able to report digital crime without exposure to risk and in some way staying anonimous are important parameters for this to work.


This is one of the natures of the digital world and business.

more...
No comment yet.