Beware of Computer Malware: The Cross-Platform Problem There was a time where you could safely assume a portable drive hooked onto to a windows PC wouldn’t be able to transfer some strain of malware to a MAC system. Most viruses were a match made in heaven for Windows, and MACs were getting none of that action. Things have changed, however. We’re now faced with cross-platform threats such as Koobface, the story of which has been illustrated in the following infographic. Malware such as Koobface is only a tiny part of a much larger botched up security puzzle. One way to
Privacy In Cloud Computing: Assured Or Assumed? All avid computer users have enjoyed the benefits and conveniences of cloud computing, either knowingly or unknowingly. Most of us rarely understand what is happening behind the screens, especially when lost in interesting movie or music, or even when perusing the information about your competitors. As a result, the privacy and security of the information in cloud is sometimes assured. What of other times? Is it assumed? Most of us overlook privacy warning and security procedures when utilizing the ever-dazzling gadgets, most of which expose us to an elevated echelon when it comes
Why You Have To Take Advantage Of Cloud Email In general, when an entity has its own server, it is but expected that it will also have its own email system. With the popularity of web based services, instead of having the domain name as the suffix of the email address, the service name becomes the suffix. Thus, email@example.com or firstname.lastname@example.org has become popular. A lot of cloud email service suppliers can now provide domain name as your suffix in the email address. Therefore, when you take advantage of such service, your email recipients will see email@example.com as your email
Security as a Service: Business Decision Factors This paper reviews the business value of IT security, illustrates the business case for SaaS over “do it yourself” premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow. In a companion paper, we show how Security as a Service (SaaS) protects small and midsize businesses from an unprecedented storm of malicious code, while escaping the tradeoff among security, performance, and cost that premise-based security forces on them. This paper looks at the business issues in SaaS: the value it unlocks,
Akamai Introduces New Cloud Defense Solutions Akamai Technologies, Inc. unveiled new cloud defense architecture aimed at protecting customers from increasing number of sophisticated Web attacks. Enhancements include improved protection from distributed denial of service (DdoS) attacks as well as improved cloud firewall featuring advanced vulnerability scanning and custom rules for additional protection against application layer attacks, the company said in a press release. Companies worldwide incur estimated losses of one trillion dollars a year, according to antivirus company McAfee, and Akamai unveils a new cloud security solution to help global business reduce financial damages from the growing number cyber attacks.