Type your search and hit enter

Stories by Robert C. Covington

Improve your internet privacy, with or without help from the government

President Trump, as part of his plan to roll back regulations put in place by President Obama, just signed legislation, passed by Congress, eliminating the prohibition against ISPs selling customer data without their written consent. This move has ignited a small firestorm of controversy. For businesses and enterprises however, this change is not as bad as it seems. Further, their privacy focus should be on search engines and social networks, which are much better at accumulating data.

Written by Robert C. Covington14 April 17 01:27

Ransomware protection -- what you may be missing

Given the success of ransomware, we need to look deeper for solutions beyond those mentioned most frequently. Here are are few of these solutions.

Written by Robert C. Covington26 July 16 01:45

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement.

Written by Robert C. Covington04 March 16 06:53

The security and risk management of shadow IT

Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.

Written by Robert C. Covington24 Aug. 15 20:00

What defines a mature IT security operation?

RSA recently published its inaugural and aptly named <a href="http://www.emc.com/collateral/ebook/rsa-cybersecurity-poverty-index-ebook.pdf">Cybersecurity Poverty Index</a>. This study is based on self-assessments by organizations who compared their current security implementations against the <a href="http://www.nist.gov/cyberframework/cybersecurity-framework-faqs.cfm">NIST Cybersecurity Framework</a>. According to the report, almost 66 percent rated themselves as inadequate in every category. With all of the recent breaches in the news, part of me is astounded at this finding. The other part is not surprised, given that this matches what I see in the field every day.

Written by Robert C. Covington16 June 15 03:59