Free ebook identifies easy to manage network security vulnerabilities
Posted on 21 November 2012.
nCircle announced the release of a new eBook entitled "Just Turn it Off" (PDF, ePub).


The book identifies twelve network security vulnerabilities that are both easy to manage and that present considerable risk to network security if left unaddressed. Each chapter identifies a vulnerability that can be addressed by doing exactly as the book’s title suggests – just turning it off.

Today, businesses of all types are faced with the strong possibility of a security breach. Every network – no matter how large or small – is ripe for attack. It doesn’t matter if you’re a multi-billion dollar financial services company in London, or a small accounting firm in Tulsa; the threat environment is the same. Attackers look at all points of entry to try and get in, whether by exploiting systems, social engineering or by riding in on infected mass storage devices.

According to a recent survey by Symantec and the National Cyber Security Alliance (NCSA), 66% of small businesses are not concerned by cyber threats. Yet, in the report for the same survey, Visa claimed that 90% of the data breaches reported to them are from small businesses.

“Smaller businesses have fewer security resources and are particularly vulnerable to cyber attack,” said Lamar Bailey, director of security research and development for nCircle. “Especially as we approach the holiday season, small businesses have their attention focused on maximizing year-end revenue. We asked some of our security researchers to compile a list of the easiest ways to improve network security with this audience in mind. "Just Turn it Off" includes a list of vulnerabilities that present unnecessary security risk and are easily disabled.”





Spotlight

Most popular Android apps open users to MITM attacks

Posted on 21 August 2014.  |  An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Aug 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //