-
Arren Soroko changed their profile picture 6 years, 6 months ago
-
Amanda M Rossetti wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 9 months ago
In a case of too stupid not to share Commonwealth Bank lost 12 million customers’ data including their financial histories from 2004 to 2014 but this wasn’t your normal breach. The magnetic tape backups just w […]
-
Amanda M Rossetti wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years ago
I never considered that that a health crisis could also cause cyber security issues but this article makes a good point about why it occurs. With anything that causes the volume of what a user is asked to do to […]
-
Jacklin Altman's profile was updated 7 years ago
-
Jacklin Altman's profile was updated 7 years ago
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 3 months ago
Research from the European Banking Authority (EBA) says that the majority of EU banks believe their operational risks will increase. Many of them are pointing to to cyber risks and data security to explain why […]
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 3 months ago
On the heels Deloitte’s security vulnerability coming to light another company large in the cyber security space reportedly suffers from lax cyber security themselves. The article explains that Accenture ha […]
-
Amanda,
The issue of having these big companies losing sensitive information is really scary. I think they have to be good examples to other organizations regarding securing data. After Equifax leakage, I won’t be surprise if Accenture confirm in the future of losing sensitive information that is related to this incident. I learned from other similar incidents that happened in the past (Example: Target breach in 2013) that most of these big institutions are not honest with their clients and show that their data is secured even if they get attacked.
Very nice article to learn from. -
Hello Amanda,
This article is quite interesting because it throws light on the fact how big companies can too struggle in protecting their sensitive information. The case of Accenture is quite surprising though, but many corporations ignore threats or instance of attacks and later struggle with breaches.
-
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 3 months ago
Members of the European Union have drafted a document stating that cyber attacks by foreign nations could be considered an act of war. They say that members of the EU may respond to cyber attacks with […]
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 4 months ago
Researchers at Check Point Research are warning that they have found a new Botnet, IoTroop. It users IoT devices similar to the Mirai botnet from last year that shut down the internet mostly for the eastern US, […]
-
Amanda,
I think the IoT is ripe for spreading infection. These devices are not built with security in mind, and are difficult to update / patch (if one is even available). The problem is that people don’t think it will ever happen to them. They think, “Why would anyone want to hack me?” but don’t realize they could be a launch point for complete internet shut down. They think they will never get hacked.
It is like driving a car. People, sometimes drive a bit crazy on the roads. They weave in and out of cars, switch multiple lanes at a time, and ride the car’s “butt” in front of them. They are aware of the risks, but may not be fully aware of the consequences. The reckless driver may end up in an accident, causing a long traffic jam and affecting other drivers, or even cause their own death.
Well… A user driving on the internet, who isn’t very secure can cause other users to suffer or even destroy their own system.
-
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 4 months ago
My article this week discusses the business risks associated with cyber security. It lists many statistics about how many organizations are attacked and the amount of money and reputation lost as a result of these […]
-
Amanda,
I do believe that cyber attacks are not only an IT problem but it can be a big business problem. A good example of that, when Target’s customers credit cards database attacked in 2013, not the only IT department was influenced because it has to work on securing the organization system, but the company lost so much business since the customers stop trusting using their credit cards in the stores or online.
Very interesting article that aware so many companies don’t invert on building a strong IT security department to start soon to do so.
-
-
Amanda M Rossetti wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 4 months ago
My article discusses the 5 worst cybersecurity habits. The 5 it identifies are: having a lax attitude, not protecting their email, clicking hyperlinks in emails, poor password practices, and not backup up data. […]
-
Hi Amanda:
I think this article is fascinating and try to think like hackers is the best way to prevent any cyber attack
-
Amanda – That’s an interesting article and definitely a good summary by you. It gives a lot of information about common habits when dealing with cybersecurity. Out of all the 5, I was personally able to relate No Data Backups as one of the worst habits I could have because I sometimes fail to do data backups on a constant basis. I wonder what would happen when one wants to recover all the uncorrupted data back. I find this quite interesting and there is a lot to learn from Lax attitude as well, something that I usually find across many people.
-
-
Jacklin Altman changed their profile picture 7 years, 5 months ago
-
Amanda M Rossetti wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
https://www.linkedin.com/pulse/big-idea-2015-coming-disruption-walter
Walter Isaacson thinks that the new innovation of micropayments could save journalism. The idea of micropayments is that you would use your […] -
Amanda M Rossetti wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
http://smallbusiness.chron.com/pros-cons-technology-business-today-2709.html
Chris Joseph from Demand Media identified some positives and negatives of how engrained IT has become into business today.
He said […] -
Amanda M Rossetti wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
https://www.salesforce.com/blog/2012/07/does-customer-service-ever-go-too-far.html
Corinne Roberts from Salesforce wrote an article on what aspects of customer service turn customers off of buying products. She […] -
Brittany M Cougle wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
In the U.S more than $2.5 trillion flows through car-related industries every year. This article states that where this money will flow in the future depends on whether cars will require human drivers. The big […]
-
Brittany M Cougle wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
Target partnered with Lilly Pulitzer, a luxury clothing line, and created a collection that would sell at a fraction of the cost of regular Lilly Pulitzer items. The demand for the product line was incredible […] -
Arren Soroko wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
In this UX Magazine article, author Avi Itzkovitch disucusses how the Internet of Things can be used to create disruptive innovations. The main point of this article talks about how connecting a device or […]
-
Arren Soroko wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
In this article entitled Integrative Thinking, author Graham Douglas explores the differences between critical thinking and integrative thinking and addresses how we are programmed to think critically because […]
-
I think some of the points Douglas makes are interesting, especially the parts about making a “narrative” for connecting wonderings, ideas, etc. I think the narrative helps give some context to general terms like “integrative thinking.” However, I have an issue with the first point above. Douglas argues that we’ve been conditioned by our education to break things into parts–but then suggests that we “memorize” categories that help trigger connections. I think that methodology sounds really similar to what our education teaches us–breaking things down, analyzing them, making connections, etc. I think staying away from breaking things down helps build a more holistic view of each problem.
-
I too posted an article on integrative thinking and do agree with what Douglas. I do think that our education conditioned us to find a problem, break it down, analyze, and find one solution for the problem.I thiink it’s okay to continue to break problems down, but we shouldn’t focus only one part of the problem. We should focus on the entire problem. I also believe that every person has the potential to become an integrative thinker. There are those rare people, who are integrative thinkers already, but I also think one can practice to become an integrative thinker. The more one practices and puts himself/herself in these situations, the easier it will be to become an integrative thinker.
-
-
Arren Soroko wrote a new post on the site MIS4596 – Section 3 Spring 2015 9 years, 10 months ago
-
One example of disruptive/ramifications that can be caused by the developing countries is job security. There is already a huge disruption in jobs like Accounting and Lawyers. These jobs are being outsourced to places like india where they are charging much lower rates with the exact same quality.
-
I feel as though the internet becoming more of a norm in developing countries is a positive thing. Instead of teachers, doctor’s and volunteers visiting these countries to help them better sustain themselves, the internet can be brought in to help countries create jobs, educate themselves and slowly help build their country.
-
The internet has been a great boon to developing countries. Recently we saw mass rallies being organized over social media. Rallies that toppled governments, and it is still going on. It has also allowed some developing countries to really shoot ahead in certain areas. If you look at some African countries for example that you will see that mobile banking, particularly mobile to mobile money transfers is something that has been used for awhile now. A technology that is only recently getting put to use here in the U.S is already old hat. This is a great opportunity for these countries since they can essential skip many of the missteps due to development and this is mainly thanks the the net.
-
- Load More