Adventures of a Soon to be Business Owner

14
This blog is a documentation of my journey into the world of small business ownership.

RECENT POSTS:

One of the most common ways hackers will exploit and attack a business network is through open and unsecure network ports.  By using a default or “easy to guess” user/password combination, hackers can gain access through network services and software such as mail servers, email servers, DNS servers, VOIP servers, and other network servers.  Here [...]

Data security – network port controls is a post from: Adventures of a New Business Owner.

It is now looking like 70 million Target customers had their personal information, including name, address, phone number, and email address, stolen during the holiday shopping hack.  Target has already experienced a loss of sales and earnings, stock price drop, and the cost of providing one year of fee credit monitoring to all the people who [...]

What does the Target hacking mean for small businesses? is a post from: Adventures of a New Business Owner.

The majority of data security attacks and vulnerabilities can be found in software applications and more specifically web software applications.  Major hacker attacks of online systems are becoming more and more commonplace with hackers exploiting vulnerabilities through SQL DB injection attacks, buffer overflows, cross-site scripting, and many more areas.   So it is important for you [...]

Data security – web based and software application security is a post from: Adventures of a New Business Owner.

I covered the need to perform routine vulnerability scans in my 5 Step Data Security Plan for Small Businesses, and in this blog post I would like to add a little more detail to how you should be performing vulnerability scans.  Not only are you using vulnerability scans to detect potential issues within your network, [...]

Data security – vulnerability scans is a post from: Adventures of a New Business Owner.