Executive Order 13636: Improving Critical Infrastructure Cybersecurity

By

Executive Order 13636, Improving Critical Infrastructure Cybersecurity, was signed by President Obama on February 19, 2013. The cyber security threat continues to grow and currently represents one of the most serious national security challenges that must be confronted. EO 13636 is intended to enhance security and Critical Infrastructure (CI) through voluntary, collaborative efforts of federal agencies and privately owned critical infrastructure. The Executive Order reads, “The cyber security threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront.” EO 13636 addresses two major issues: information sharing and protection of privately… Read more ›

Executive Order 13636: Improving Critical Infrastructure Cybersecurity

By

Executive Order 13636, Improving Critical Infrastructure Cybersecurity, was signed by President Obama on February 19, 2013. The cyber security threat continues to grow and currently represents one of the most serious national security challenges that must be confronted. EO 13636 is intended to enhance security and Critical Infrastructure (CI) through voluntary, collaborative efforts of federal agencies and privately owned critical infrastructure. The Executive Order reads, “The cyber security threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront.” EO 13636 addresses two major issues: information sharing and protection of privately… Read more ›

Technology Trend Tuesday: Encryption

By

We are currently living in the Technology Era. Innovation and technological advancements have allowed us to perform everyday tasks more efficiently than ever before. One technological advancement in particular that has revolutionized the way we store data is Cloud Storage. The Cloud allows us to store and access all of our data in a virtual storage system that can be accessed anywhere and from multiple devices. While convenient, the privacy and security implications that come with digitally stored information is an issue that cannot be ignored. One of the most popular ways businesses, as well as cloud users in general, are dealing with… Read more ›

Keeping Account of Your Cloud

By

5 Ways nCrypted Cloud can help you protect your identity when sharing confidential information with your accountant.      Yes yes, we know. Tax season is over. Finished. Kaput. However, while your tax forms may be filed, where is the information that was used to fill them out? What has happened to those documents you sent your accountant? How many countless details about your life and finances are out there? Unlike with your taxes, out of sight, out of mind does not apply here. Yet, worry not! nCrypted Cloud can provide you with the confidence that your confidential information stays… Read more ›

Secure Offshore?

By

Why data security is not a sure thing when storing offshore.      With the news of the NSA’s activities in phone tapping, data mining, and information collection the majority of us have been feeling like the reluctant residents of the Big Brother house. We are recognizing that our digital databases, filled with everything from vacation photos to financial records, aren’t as protected as we had hoped. In the coming days and weeks there is sure to be an influx of people storing their data offshore. However, there are a few aspects you should consider before packing your data and… Read more ›

The Internet of Things

By

The Internet of Things is based on the concept that the future of the internet will consist of data created by things instead of data created by people. Kevin Ashton, expert in digital innovation and founder of the Auto-ID Center at MIT, coined the term “The Internet of Things” to describe how RFID sensors are enabling technology, or ‘things’ to digitally identify itself and connect with other ‘things’. The Internet of Things encompasses the idea that the physical world is becoming an information system. The implications of this prompts us to empower technology with its own means of gathering information. When… Read more ›

The Password is…Encryption.

By

Password? Puhhhlease! Why encryption is key.     How many passwords do you have? Three main ones, possibly four, that are all variations of your children’s names, your birth date, the city you grew up in? Maybe, if something is super important, like an online bank account, you’ll add an exclamation point or underscore. If you have some punctuation marks in there it’ll put a full stop to devious hackers and identity thieves…right? Wrong. Password protection, no matter how clever and unique your password, is most definitely not foolproof.     Just because you stamp “confidential” on a folder doesn’t… Read more ›

Stormy Weather: NSA and FBI Collecting Content from the Cloud

By

Why the issue of data security in the cloud is more pertinent than ever.     News sites are abuzz with reports that the NSA and FBI are collecting information from popular sites like Google, Facebook, Apple, and many others. Just last week, Google’s argument against the FBI, in resistance to the FBI’s request for user information, was rejected by District Court Judge Susan Illston. Google, who has been the recipient of several thousands of National Security Letters (NSLs) from the FBI, attempted to make the case that these demands were in violation with the organization’s constitutional rights.    … Read more ›

Cloud Security and Business

By

Cloud services are becoming increasingly popular because of their ability to shorten cycle times at a reduced cost. By giving users the flexibility and convenience of storing, sharing, and collaborating on the cloud, it is no surprise that cloud platforms are extremely attractive to businesses. In fact, cloud services have the potential to serve as a company’s biggest asset because of the vital role it can play in the company’s value chain. However, the main concern regarding cloud adoption is cloud security. Forrester Forrsights, a global research and advisory firm, conducted a study where over 2000 security decision makers were… Read more ›