As I said last week, while the bombing is a horrible event, it does point out how brittle our telecommunications world is. That being said, for most companies, the rest of the IT infrastructure is probably more brittle. Companies should use this as an opportunity to review their situation and see if they can make […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The terrible events in Nashville will take a long time to recover from. The bomb, likely intentionally, severely damaged an AT&T “wire center” near downtown, shutting off AT&T service for millions of customers. This included some 911 call centers, cell phone users, land line customers, Internet service and even cable TV. Those 911 call centers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We definitely live in interesting times. The virus is surging and at the same time morphing. Two different vaccines have been approved for emergency use. More are on the way. The country is discovering that actually getting vaccines in people’s arms is harder than talking about it. AND, there is talk of you having to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Privileged accounts represent a major vulnerability for all networks and systems. If a hacker can compromise a privileged account they can do a lot more damage than if a regular account is compromised. So what do you need to do to protect those accounts? Note that privileged accounts exist at the operating system level (Windows, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As is often the case when the feds do something, there is probably at least one thing that is good in this notice of proposed rulemaking and probably others that are less good. The HIPAA privacy rule is designed to protect the privacy of patient data, but other than stopping providers from selling your health […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
So you have been hacked and the hackers stole your customers’ data. You try to do the right thing and notify them. By email. Because that might be the only address you have for them. But many times that email never makes to your customer. Blocked by the customer’s email service provider or spam filter. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]