This blog is a documentation of my journey into the world of small business ownership.
Data security – network port controls
March 6th, 2014 01:33
One of the most common ways hackers will exploit and attack a business network is through open and unsecure network ports. By using a default or “easy to guess” user/password combination, hackers can gain access through network services and software such as mail servers, email servers, DNS servers, VOIP servers, and other network servers. Here [...]
What does the Target hacking mean for small businesses?
January 10th, 2014 01:45
It is now looking like 70 million Target customers had their personal information, including name, address, phone number, and email address, stolen during the holiday shopping hack. Target has already experienced a loss of sales and earnings, stock price drop, and the cost of providing one year of fee credit monitoring to all the people who [...]
Data security – web based and software application security
December 5th, 2013 10:07
The majority of data security attacks and vulnerabilities can be found in software applications and more specifically web software applications. Major hacker attacks of online systems are becoming more and more commonplace with hackers exploiting vulnerabilities through SQL DB injection attacks, buffer overflows, cross-site scripting, and many more areas. So it is important for you [...]
Data security – vulnerability scans
October 17th, 2013 10:00
I covered the need to perform routine vulnerability scans in my 5 Step Data Security Plan for Small Businesses, and in this blog post I would like to add a little more detail to how you should be performing vulnerability scans. Not only are you using vulnerability scans to detect potential issues within your network, [...]