Information Security

Google Secure Search: Reacting to Keyword Not Provided

There has been quite the uproar the past few days, after Google announced that they are moving 100% of search queries from unencrypted to Secure Search. When this news broke on September 23, the SEO world had a collective panic attack. But is this really the end of SEO as we know it? Google Secure…

Read More

WordPress Site Hacked? Start Here.

WordPress is our CMS of choice for most small- to mid-sized businesses. There are a slew of benefits, from putting web content management in the hands of non-technical staff to providing a platform to launch a site in a short timeframe. It does come with some downside, though. When a platform is built and maintained…

Read More

Social Media and Internet Privacy for Consumers

Enjoy today’s guest post by freelance writer Becky Wilcox. Over the last 10 years, social media sites have been growing rapidly. They have become a main way to connect and communicate for individuals, and the youth of today, having grown up with this as their “normal”, are always connected. But there are dangers and concerns…

Read More

Internal Social Networks: The Next Evolution of the Intranet

Social networks are the backbone of social media, the places where we can virtually gather with likeminded professionals in different companies, locations, and industries. Leading platforms such as Facebook, LinkedIn, and Google+ are well known and understood. And they serve a great purpose for the vast majority of us. From the perspective of the enterprise,…

Read More

Twitter URL Shortener: Good Response to Phishing

The news sort of came out a bit under the radar, but Twitter announced a very interesting change they are implementing on their blog (March 9, 2010). Positioned as a response to phishing, they will be changing URLs in Direct Messages to their own twt.tl shortened redirects. Essentially, they can then track for bad behavior and block the URL altogether if the target web page is found to be malicious.

Read More

Social Media: Think Before You Tweet

Last week while traveling to San Francisco for the RSA Conference 2010, I finally took the time to figure out how to use TwitPic from my mobile phone. It was like a revelation! For those of you who follow me, you may have seen as I posted various photos from the trip out there, my dinner the first night, etc. I had a shiny new toy!

Read More

Information Security & the New Generational Gap

Since the RSA Conference is happening this week, I thought it would be different to do a piece that hits on both Real-time and Information Security. The following blog post is my own original work that appeared on The Network View, the official blog for Anue Systems, on November 12, 2009. It highlights some important sociological differences between the various generations of today’s adult population, and looks at how changing work habits and security need to find a workable balance.

Read More