InfoSec Tools, Tips and Thoughts

William McBorrough

Subscribe to William McBorrough: eMailAlertsEmail Alerts
Get William McBorrough: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by William McBorrough

What is the values proposition for allowing employees access to web 2.0 resources such as social networks? Every other day, we hear about the risks. Compromised Twitter accounts, phishing via LinkedIN,  malicious Facebook apps were only a sample of an every growing landscape. Most enterprises, appreciating the threats these pose to an environment, simply deny access to social networks from company systems and networks. Even within such organizations, there are user who need to access social networks to perform their job functions. LinkedIN has become a great tool for recruiting prospective new hires. More companies are using Twitter, Facebook, Myspace and others to promote their business an connect with customers. But outside of that, is there a value in allowing employees, whose job function do not require it, access to social networks on company systems? I’m promp... (more)

Will Your Cloud Provider Be Around in Two Years?

I just read that my hosting company, GoDaddy, is on the auction block to be sold to the highest bidder. Naturally, I’m thinking of how this change of ownership could adversely affect the service of my web sites, blogs, and virtual servers.  One never really knows until the new owners take over. Maybe they clean house and things change for the better. Or they may look to cut costs and things could take a downward turn. Migrating to a another service would a pain but I could do it if needed. This brings to mind the current state of the cloud computing market. The mad gold rush of ... (more)

It;s a start but is it enough?…

It;s a start but is it enough? | Canada releases #Cyber #Security Strategy: http://bit.ly/ayqrOU Related posts:IBM X-Force handicaps future trends in security Pentagon and Congress wants control of your network during cyberattack Internet Explorer 9 "Preview" Now Available ... (more)

The Real Arguments for Cloud Computing

As more vendors dive into the cloud computing market, every possible claim regarding the supposed benefits of moving to a cloud-based service is being made.  I ran across an article titled ” Why Cloud-based Monitoring is more reliable and secure than Nagios. ” The author, who represented a cloud-based network monitoring company, contended that the Software-as-a-Service (SaaS) model offered by his company was better for companies than Nagios and other open source products. The question is not  Cloud Computing vs. Open Source.  In fact, there are open source SaaS providers like Mi... (more)

Cyber Security Alliance Helps Small Businesses Address Security Risks

Across all industries, small businesses are increasingly facing new threats related to cyber security. Whereas some have taken minimum steps to address these threats but most have not. New security threats and incidents are reported every day in news reports and a many remain unreported. This underscores the need for cyber security education of small business owners and managers. These threats have potentially serious consequences and could lead to unrecoverable damage to small businesses. What are some consequences of the lack of basic cyber security controls? Loss or stolen cus... (more)