home.aspx
 
EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...


ASK takes the hassle out of technology so that you can run your business. For all of your IT needs, just ask for ASK! ASK is a full service IT products and services provider, serving the needs of Michigan businesses since 1993. We combine personalized customer attention, technical excellence and project efficiency to ensure that we always exceed our customer's expectations.

RELATED NEWS


Hundreds of millions of users to be notified. Scandal-ridden social network giant Facebook has owned up to accidentally storing hundreds of millions of user passwords in clear text, but says they were not exposed externally. Facebook's vice president of engineering, security and privacy Pedro Canahuati said the unmasked passwords were found during a routine check of systems. "This caught our attention because our login systems are designed to mask passwords using techniques that make th...
ITNEWS
READ MORE

A fully patched Firefox was no match for researchers at the Pwn2Own competition, though Mozilla found itself up to the task and has already patched the two issues found in its web browser. Firefox wasn't the only thing hacked at Pwn2Own as researchers were also able to exploit the internet browser on a Tesla Model 3 as well. Multiple issues in the Firefox 66 web browser, which was just released on March 19, were demonstrated at the Pwn2Own hacking competition on March 21. On March 22, Mozill...
EWEEK
READ MORE

During a routine security review in January 2019, Facebook discovered that some user passwords had been stored in plain text on its internal data storage systems, an issue that raised concerns given that the company’s login system is supposed to mask passwords, according to the Facebook newsroom. The security flaw has reportedly been fixed, and Facebook said it will be notifying everyone whose passwords were unencrypted, which it said could be hundreds of millions of Facebook users in addi...
INFOSECURITY MAGAZINE
READ MORE

Cyber-criminals are evolving their tactics with Business Email Compromise (BEC) attacks by transferring victims from email over to mobile communications channels early on in a scam, according to Agari. Researcher James Linton described how such an attack typically takes place, with the initial spoofed CEO email containing a request for the recipient’s mobile phone number. “By moving them over to their cell phone, the scammer is equipping their victim with all the functionality needed...
INFOSECURITY MAGAZINE
READ MORE

Those thinking artificial intelligence (AI) will steal their jobs need not worry – the software is only filling the blanks, at the moment. And the blanks, at least when it comes to cybersecurity, are quite large. According to the latest Trend Micro figures, organisations worldwide are faced with an ‘ongoing and often detrimental’ shortage of cybersecurity talent. Obviously, every company needs to stay secure, so these companies that can’t find fitting staff are turning to...
ITPROPORTAL
READ MORE

Speaking at the IAPP Data Protection Intensive 2019 conference in London, a panel discussion on the first year of GDPR and “What Actions Have Been Taken?” explored how over €55m has been handed out in fines, although the majority of that was the €50m levied at Google. The last year has also seen data protection authorities more than double their head counts. Moderator Vivienne Artz, chief policy officer of Refinitiv, reflected on data relating to investigations, reports and...
INFOSECURITY MAGAZINE
READ MORE

Organizations across the US and Japan have plans to increase their use of artificial intelligence (AI) and machine learning (ML) this year, yet many don't really understand the technology, according to a new report from Webroot. A survey of 400 IT professionals from businesses across the US and Japan, conducted by LEWIS between November 26 and December 5, 2018, asked participants whether they plan to implement AI and ML. The results, published today in the global report, Knowledge Gaps: AI a...
INFOSECURITY MAGAZINE
READ MORE

Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period. Struggling to recover from the outage, local officials reportedly paid a ransom worth $400,000 in bitcoins to restore IT systems and infrastructure. Jackson County Manager Kevin Poe told Online Athens that the county government decided to cough up the ransom late last week after IT systems had been offline since about March 1, forcing officials to use pa...
BANKINFOSECURITY
READ MORE

Finding skilled cybersecurity staff is an increasingly difficult task, new research has claimed. A new report by Tripwire found it’s not just about not having actual people to do the job – it’s also due to the rapidly transforming technology and threat landscapes. Consequently, the required skillset transforms equally fast, and that becomes a huge challenge for businesses. Almost all respondents (93 per cent) confirmed that the skills required to be a great security professiona...
ITPROPORTAL
READ MORE

Speaking at RSA Conference 2019, Black Hills Information Security owner John Strand discussed threat hunting and how this can be done on a small budget. He admitted that identifying command and control (C&C) traffic is “very difficult” as we have got to the stage where malware can be stealthy and uses C&C to hide, and encryption is used within encryption, while we rely on the impossible task of writing signatures. Strand said: “After a pen test we talked to a customer a...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...