Security As A Service: Do You Get the Service You Expected? (Part 2/2)

Following the first article about why organizations should outsource security services, in this post I would like to address some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot more considerations and arrangements.  It is not the intension of this article to be comprehensive in this regards, because many aspects are outside the information security scope.   Therefore the below covers just a few more but important action items when searching for a new security service provider.

When the Cryptolocker Strikes – Reasons for Success of Ransomware

It was at a public sector customer’s site when our shared project mail account received a quite legitimate-looking email with an invoice in a .docm document and a request to verify its contents. The sender seemed to be a lady employed at the customer’s organization. But at second look, something was wrong with it. She was not employed here nor has she ever been. I showed it around the project team and we quickly got very skeptical, deleting it. According to the information security staff…

Population Health Management: Integrating eHealth-Technologies, Health Management and Health Economy

Many eHealth initiatives are pretty much known in the German healthcare system as well as in further European countries. The different scopes range from video-consultation for seriously ill COPD patients, tele-radiology to the electronic health card or certain regional health-supply systems (e.g. “UGOM” in Bavaria, Germany) – some of them already proven in daily practice.

Certificate Housekeeping

Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade…

Securing your Quantified Self

One can look at the Internet of Things in a way where sensors are embedded in the physical world, e.g. plant sites, offices, homes or humans. Sensors embedded in the physical world of  humans are also known as wearables. Wearables such as fitness trackers and the like are an important component of the Quantified Self . But wearables are more; they also include  items like smart watches and smart eyewear. Gartner expects a strong growth in the wearable market in 2015, rising 38% from 2014.

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden