Stories by Tony Bradley

Yahoo Mail hack teaches a valuable lesson

Yahoo Mail was hacked. Details are sketchy in terms of just how many Yahoo Mail accounts have been compromised. Yahoo suggests that the attackers most likely gained access to the data through a third-party database outside of Yahoo control. Regardless of how the compromise occurred, there is a lesson to be learned here...again.

Tony Bradley | 31 Jan | Read more

Retailer data breach trend not likely to end soon

Three major retail chains have recently admitted being victims of massive data breaches that compromised sensitive data from over 100 million customers. Sadly, though, Target, Nieman-Marcus, and Michael's are just the beginning of a trend that isn't likely to fade away any time soon.

Tony Bradley | 27 Jan | Read more

Why 2013 was the year of the personal data breach

As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.

Tony Bradley | 26 Dec | Read more

Why 2013 was the year of the personal data breach

As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.

Tony Bradley | 26 Dec | Read more

Is your browser ready for shopping season?

The holiday season is officially underway. Your good cheer could quickly turn sour, though, if you don't secure your browser before shopping online. Research from Qualys found that almost 40 percent of all browsers have critical vulnerabilities that could enable cyber criminals access to your personal data.

Tony Bradley | 05 Dec | Read more

Shadow IT is undermining your security

Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."

Tony Bradley | 04 Dec | Read more

Why mobile and Cloud will converge to become Mobile Cloud

Everything's coming up mobile these days. Gartner estimates that PC sales will make up only about 13 percent of device sales in 2013 - and some undisclosed portion of those PCs are notebooks. The more we rely on small, mobile devices to get things done, the more we also depend on Cloud storage and services to extend functionality beyond what the mobile device itself is capable of. That's why mobile and Cloud will become mobile Cloud.

Tony Bradley | 27 Nov | Read more

Prepare for Cyber Monday security concerns

In a couple days the United States will celebrate Thanksgiving, and Black Friday--the official launch of the 2013 holiday season will go into high gear. Traditionally, the Monday following Thanksgiving is Cyber Monday--the day the online retailers offer holiday deals too good to pass up. Cyber criminals know this as well, though, which makes Cyber Monday a very risky proposition.

Tony Bradley | 27 Nov | Read more