Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Hotel Wi-Fi Vulnerability a Reminder About Security Risks on the Road

30 Mar, 2015

No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels.

...More >

Is It Time for Federal and State Leaders to Improve Cybersecurity Efforts?

26 Mar, 2015

When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity.

...More >

Mobile App Development Often Ignores Security Measures

23 Mar, 2015

Corporations have the chance to increase the security of the apps they are developing and to show that they respect the data of their customers, clients and employees.

...More >

Report Finds Companies Remain Lax with PCI Compliance

19 Mar, 2015

Becoming PCI compliant is important, but real cybersecurity comes when the company sustains the controls well beyond the assessment period.

...More >

Health Care Industry Returns as a Prime Data Breach Target

18 Mar, 2015

The health care industry is lax when it comes to security.

...More >

March Madness Provides Plethora of Opportunities for Online Predators

16 Mar, 2015

IT staff worries that networks will be at a greater risk because of all the March Madness online activities – much of them done without permission or against company rules.

...More >

Stress Levels on the Rise for Security Professionals

12 Mar, 2015

Trustwave's study gives a clearer picture of the heavy IT security expectations being put on data security professionals today.

...More >

Almost No One Is Immune from the FREAK Attack

09 Mar, 2015

The first reports of FREAK Attack, which like Heartbleed involves open source code, were via initial warnings through Mac and Android-native browsers.

...More >

A Serious Look at Third-Party Security

05 Mar, 2015

In so many of the high-profile breaches we’ve seen over the past 18 months, a third-party security breakdown has been, at least partially, to blame.

...More >

Can Your Company Handle Security Challenges Posed by the Internet of Things?

02 Mar, 2015

It might be time to consider an IoT section to your cybersecurity policy.

...More >

CEOs Talk Better Cybersecurity, but Are Disconnected from Security Efforts In-House

26 Feb, 2015

Corporate leaders publicly agree that cybersecurity is a top priority for business, but recent studies prove that most CEOs don't understand how it works.

...More >

Impersonating IT Staff Becoming a Popular Phishing Tactic

25 Feb, 2015

An email that looks like it is coming from the IT department is a lot harder to ignore, especially if the email covers a legitimate area of concern with the business.

...More >

SMBs Unclear on Data Breach Notification Laws

23 Feb, 2015

Perhaps by putting federal standards in place, SMBs will have an easier time understanding what constitutes a breach and when it needs to be reported.

...More >

Mobile Devices Quickly Becoming the Favored Attack Point

19 Feb, 2015

If there really is such a thing as BYOD fatigue, we’d better get rest fast because there could be a long fight against malware ahead.

...More >

Spyware Embedded in Hard Drives May Have NSA Connection

18 Feb, 2015

Recent stories have surfaced concerning spyware imbedded in hard drives and it may be connected to the NSA.

...More >

Cybersecurity Sharing: The Latest Fad or a Real Security Breakthrough?

16 Feb, 2015

Government agencies and private industry should be working together as a united front to better address the evolving threats facing our networks and data.

...More >

When Email Reveals Too Much

12 Feb, 2015

Lessons learned from Jeb Bush's email fiasco.

...More >

Expect Shadow IT to Be a Long-Term Problem

09 Feb, 2015

A recent study shows that IT departments greatly underestimate how many shadow IT apps are being used within the enterprise.

...More >

Was Anthem Breach a Sophisticated Attack or Just Lax Security Controls?

05 Feb, 2015

Medical data holds little interest for the hackers; the personal information with Social Security numbers holds a lot more value financially.

...More >

Are Insider Threats the Security Professional’s Number-One Concern?

02 Feb, 2015

Thanks in part to the recent Sony hack, insider threats and the dangers they pose are getting a lot more attention than they have in the past.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date