We get letters of thanks and unsolicited testimonials from raving INVISUS fans every day. This letter caught my eye because it captures some of the essence of who INVISUS is and shows a little about our “secret sauce” behind retaining so many thousands of customers year after year. Read what customer Doug Reid said today about why he’s a raving fan:
“I thought I would get the usual “starred-rating” choices to choose from for rating my recent Invisus service, but instead it spit out an actual email so I can say what I want clearly. I just want to say that, once again, you More >
The death of Osama bin Laden is no exception. A major part of the bin Laden spam is coming from emails that look like Facebook updates from friends.
The email looks like it comes from friends and urges the user to cut and paste a string of malicious text in order to access a video of bin Laden’s killing. If a user follows the directions, they are actually granting full access of their accounts to the hackers.
The hackers then use the compromised accounts to further propagate the virus by sending it to the users’ friends.
Other hacker campaigns that exploit bin Laden’s More >
If you own or manage a business today, you better be paying attention to the risks with cyber-security and identity theft. The trends continue to point to the risks and threats businesses and organizations of all types now face in the digital age. If you haven’t ever heard of or considered the risks with ”data breaches”, and other key phrases like ”information security compliance”, now would be a good time to start listening.
Verizon’s 2010 Data Breach Report (released on Apr 19) found that the number of data breaches quintupled from 2009, and at the same time discovered that cyber-criminals have shifted their attention smaller businesses. The number of incidents in More >
Smartphones are amazing devices that allow a business to be more productive and lets the personal user have access to information, games, social networking sites, and more at their fingertips. It’s like having a computer in your pocket. Cell providers are watching more people switch to the smartphone for personal use and business. But they are not the only ones keeping an eye on this trend.
Cyber criminals are increasing the sophistication and frequency of attacks on business and government networks, including a shift in focus to mobile devices. Attackers have been waiting for the time when creating malware for smartphones More >
Big news for us here at INVISUS! Our flagship service, InfoSafe, now has an official home of its own on the Internet. InfoSafeCertified.com went live this week making it much easier to find and learn about the InfoSafe program and InfoSafe Certification. I am personally excited about this new site because it will be the primary driver of our global brand building and marketing efforts for InfoSafe. Look out world – here comes InfoSafe! If you are not familiar yet with the InfoSafe Certification, check out the info below – or, of course, just go to www.infosafecertified.com!
About InfoSafe: InfoSafe is the industry’s leading information More >
Lately, I have been getting an increased number of spam email from “Hotmail” or “Windows Live Services” asking me to confirm my account or it will be deleted or suspended. These emails are intended to trick the user into filling out a form with their usernames and passwords in order to keep the account active.
The problem here is that Hotmail, Yahoo, Gmail, and any other legitimate email service you can think of will NEVER ask for that information. So stay safe out there and don’t give usernames or passwords to anyone. Below is a copy of one of the emails More >
The holidays are here and shoppers are out (and in) in full force. It seems as the years go by, online shopping is becoming the ideal way to get your loved ones, and yourself, gifts for the holidays. Cyber-Monday is growing every year with deals getting better than those offered on black Friday. Retailers are offering deals online that you just can’t get in the stores.
I still go out on black Friday, but it is more of a nostalgic thing. I like to watch people go crazy and reminisce about the good old days when shoppers would trample each other More >
Businesses are dragging their feet when it comes to meeting PCI standards and it may be costing them more than they think. Verizon released a new report today on PCI compliance and data breaches. The report had some jaw-dropping results.
Only 22% of companies were found to be compliant upon their initial report. Couple that with the fact that organizations that had a data breach were 50% more likely to not be PCI compliant and there is a recipe for disaster.
The 78% of organizations NOT compliant with PCI standards are 50% more likely to suffer a data breach. Recovering from a data More >
Your router is an important part of your connection to the online world. It gives you a level of protection from the outside world. It distributes the internet to all the computers in your house. But it can also be a major security risk.
All routers come with default passwords. I know this, you know this, and hackers know this. Hackers get lists (which are freely available online) of all the default usernames and passwords for routers. From Linksys to D-Link to Belkin and everything in between. If you have not changed the default credentials, it is very easy for someone More >
If you are anything like 500 million other people, you have a Facebook account. I admit, I do. I think Facebook has many useful purposes. I can share my photos and videos with family that live all over the world. I can keep in contact with friends I haven’t seen since high school, and make new friends with those that have the same interests as me.
With so much good that can come from Facebook and other social networking sites, we can’t ignore the security and privacy risks. No matter how hard developers of these sites try, they will never be More >