Monthly Archives: November 2013

Link

In his 11 sure signs you’ve been hacked post, Roger Grimes writes

Most malicious hacking originates from one of three vectors: unpatched software, running Trojan horse programs, and responding to fake phishing emails. Do better at preventing these three things, and you’ll be less likely to have to rely on your antimalware software’s accuracy — and luck.

For at least two of the three vectors Grimes mentions, the long held belief is that awareness and endpoint security will help the customer offset the threat. But the opposite appears to be the case, the more protection software we give the user, the less likely they are to rely on their own wiles.

Is the challenge for the Security industry then to focus on certain less obvious to the customer prevention opportunities rather than the more lucrative and overt cure of endpoint anti-virus which has been so valuable to the industry for so long? It’s going to be hard to leave the money on the table, especially when so many have been conditioned to accept that anti-virus is to a computer as a saddle is to a horse.

The reward is likely to be a happier, more confident customer, and a refocus on where the puck is going to be rather than where it was last year.

Link

Can’t really add much to Danah Boyd’s logical argument:

Rather than trying to protect teens from all fears and risks that we can imagine, let’s instead imagine ways of integrating them constructively into public life. The key to doing so is not to create technologies that reinforce limitations but to provide teens and parents with the mechanisms and information needed to make healthy decisions.