Teramind:

Data and Workforce Security

New: The Unrestrained Threat Of Media Piracy

How to Build a Successful Remote Team

Teramind Blog: How to Build a Successful Remote Team
Building a remote team is about finding the right people, managing time correctly, and communication. What may seem challenging at first becomes much easier once you understand how your employees work, what their needs are, and how to provide them with the information and tools they need.

Recruit Employees that Suit your Needs

Before you start, figure out what you need from your employees and what your budget is per employee.
Read more...

Help Net Security Highlights Security Advice from Teramind's Isaac Kohen on Mitigating Internal Risk

Teramind Blog: Help Net Security Highlights Security Advice from Teramind's Isaac Kohen on Mitigating Internal Risk
Try Teramind for Free!

IT security is usually focused on how to prevent outsiders with malicious intent from causing harm to your IT systems and data. While this is a valid concern, people within organizations who simply do not understand the consequences of their everyday habits and behavior on company computers pose an equivalent if not greater risk.
Read more...

The Evolution of Insider Threats & How To Deal with them Today

Teramind Blog: The Evolution of Insider Threats & How To Deal with them Today
Try Teramind for Free!

IT security is too often focused on perimeter defenses and technical solutions and overlooks the most dangerous part of security, which are employees. The vast majority of employees are honest people and not rogues. But they are careless in where they click and what they open. Outward facing firewalls work well, so hackers don’t usually try to penetrate those.
Read more...

Strengthening your Organization’s IT Security through Education

Teramind Blog: Strengthening your Organization’s IT Security through Education
Try Teramind for Free!

Let me start by stating the following statement. Internal security is about placing the appropriate security controls to achieve confidentiality, integrity and availability on your organisation assets. However, most organisations are confused with this philosophy. The principles of confidentiality, integrity and availability are not balanced.
Read more...

Is your IT Security Strategy all Wrong?

Teramind Blog: Is your IT Security Strategy all Wrong?
In a world in which many companies of iconic value (think Paypal, Yahoo, Sony and more) have been hacked, along with a number of military superpowers, companies can never be too careful in protecting their internal data. And yet, often times, organizations neglect to adhere to some of the most basic security practices. The result? Mass data breaches, system hacks, and an average financial loss, as estimated by Ponemon Institute research, of $154 per hacked record, and $3.
Read more...

The Human Factor in Cyber Security, Part 1: The Curious Employee

Teramind Blog: The Human Factor in Cyber Security, Part 1: The Curious Employee
My first title: Networked Systems Administrator. The year is 1997, and I’m 14, working part-time, 4 hours a day after high school at an ISP in midtown Manhattan.

The biggest security challenge: root exploits to obtain privileged access to our systems. There is always the looming threat of a catastrophic hack that will put us out of business.
Read more...

Ofcom – What can be learned from the data breach?

Teramind Blog: Ofcom – What can be learned from the data breach?
Recently a data breach struck the British television watchdog Ofcom, in which a whole slew of information was stolen. A former employee left the company with data about a number of broadcasting companies, including details about their budgets, revenue and television line-ups, as well as a variety of other useful information. In all, over 6 years’ worth of data was stolen.
Read more...

191 Million Voters' Records Exposed... Happy New Year?

Teramind Blog: 191 Million Voters' Records Exposed... Happy New Year?
In the days leading up to Christmas, Chris Vickery, the same security researcher that discovered the Hello Kitty data breach, was peeking about in the darkest caverns of the internet on a quest to find security holes and alert the responsible parties.

Like a metal detector hobbyist searching for slivers of antique metals, Vickery got a blip on his radar when he discovered a potentially-open cache of voter data.
Read more...

The Digital War: Protecting Infrastructure To Avoid Chaos

Teramind Blog: The Digital War: Protecting Infrastructure To Avoid Chaos
In 1983, David Lightman's fool-hearted attempt to hack into a video game company's database and sample some of their new games quickly elevated past the level of high school pranks. Instead of finding video games, David accidentally hacked into the military's supercomputer and brought the world to the brink of Global Thermonuclear War.

“Shall we play a game?”

Thankfully, this is merely the plot of the 80s flick, WarGames, or else the world would presumably be an apocalyptic wasteland right now.
Read more...

Hello, Kitty? Where Is Your Cyber Security?

Teramind Blog: Hello, Kitty?  Where Is Your Cyber Security?
Just in time for the holidays, Sanrio Co., the Japanese company that owns the Hello Kitty brand, has announced that an apparent security gap has led to the exposure of 3.3 million users. The users are all registered members of a fan website for Hello Kitty, and include nearly 200,000 minors, all of which have had their names, birthdays, and possible passwords exposed.
Read more...
Subscribe to Blog