Showing 21 results for: 2014 ×Perspectives ×

Yes, Your Password is Easy to Crack

The state of passwords remains dismal, according to the latest Trustwave statistics, with easy-to-crack credentials still the norm across businesses. But automated cracking tools have gotten so good that simply picking an alphanumeric sequence is not enough anymore.

What You Need to Know About Exploit Kits

Trustwave researchers this week published their findings after studying the inner workings of the well-oiled Magnitude Exploit Kit. What steps can your organization take to keep a safe distance from this dangerous – and popular – crimeware?

Sandboxes May Not Be Much Fun for Your Network

Sandboxing technology operates with a fundamental flaw: A company must first be infected before any action can be taken. In contrast, anti-malware technology can assess and block zero-day exploits, targeted attacks and advanced persistent in real time.

5 Reasons to Go Beyond HIPAA Compliance

When it comes to HIPAA compliance, many organizations are only interested in what they need to do to appease the auditor. But in a sophisticated threat environment, that mindset can invite complacency and trouble. Here are five reasons why health care entities should go beyond HIPAA and place a deeper focus on security.

A Simple Strategy to Make Life Harder for Hackers

With weak passwords contributing to nearly a third of the data breaches Trustwave investigated in 2013, organizations must seek out additional modes of defense against credential-stealing and credential-exploiting attackers. When delivered as cloud and managed based, two-factor authentication is a useful and simple method that can protect both internal and external assets.

March Madness? More like March Malware-ness

The annual tradition that is the NCAA college basketball tournament brings great excitement to many people, but it also introduces "maddening" risks for security professionals. But there are ways to balance the two.

Has Cyber Security Awareness Improved Among the Largest U.K. Businesses?

About a year ago, Trustwave conducted research to determine how many of the U.K. FTSE 100 companies identified cyber risk and data security, in their annual reports, as a concern. For some industries, the numbers were troubling. So we decided to carry out the research again to learn if there were any improvements made. What we found may ease some of your worries.

6 Common Questions Answered About Windows XP End-of-Life

Microsoft is ending support on April 8, 2014 for the Windows XP operating system. Yes, all good things must come to an end. Entities that fail to update are doing so at their own risk, both from a security and risk perspective, as well as a compliance standpoint. Gregory Rosenberg, a security engineer at Trustwave, answers some of the common questions about XP end-of-life that we've been receiving from customers.

How to Prepare for the Incoming Wave of HIPAA Audits

The HIMSS 2014 health care IT conference saw a heavy focus on security, privacy and compliance. Included was discussion around the next round of HIPAA audits, which will impact both covered entities and business associates. Risk assessments and analysis will be a critical way to prepare for and pass these audits.

How to Survive After Windows XP Dies

It seems as though Windows XP has been with us for a lifetime. But one of the most commercially successful operating systems ever created has created a security conundrum.