Articles By Howard Solomon

Configuration mistakes blamed for bulk of stolen records last year: IBM

Misconfigured servers accounted for 86 per cent of the record 8.5 billion records compromised around the world last year, according...

February 11th, 2020 Howard Solomon

New report warns businesses of coronavirus email scam

Scams that take advantage of fears about the spread of the coronavirus have mainly been aimed at consumers. However, a...

February 10th, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Bluetooth security problem, bad Android apps and nude photos on the Internet

Bluetooth security problem, bad Android apps and nude photos on the Internet. Welcome to Cyber Security Today. It's Monday February...

February 10th, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Oscar movie scams, and make sure you update these products

Movie scams, and make sure you update Windows, WhatsApp and Cisco products Welcome to Cyber Security Today. It's Friday February...

February 7th, 2020 Howard Solomon
Gavel in court

Canadian privacy czar takes Facebook to court over Cambridge Analytica scandal

The federal privacy commissioner is fulfilling his promise to ask a judge to declare that Facebook contravened Canada’s private sector...

February 6th, 2020 Howard Solomon

Bell chooses Nokia as ‘first’ 5G network supplier, awaits Huawei decision

Bell has decided not to let the federal government's long-pending decision on allowing carriers here to use Huawei equipment in...

February 6th, 2020 Howard Solomon

Vodafone to chop Huawei equipment from core of its European wireless network

The United Kingdom's decision last week to limit carriers from putting equipment from Huwaei and other high-risk providers into the...

February 6th, 2020 Howard Solomon

No expectation of privacy in an IP address, Alberta judge rules

Police in Alberta don't need a court order to get an external IP address from a service provider in trying...

February 5th, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Top vulnerabilities cyber crooks go after, Twitter and Google blunders and keep physical security in mind

Top vulnerabilities cyber crooks go after, Twitter and Google blunders and keep physical security in mind. Welcome to Cyber Security...

February 5th, 2020 Howard Solomon

Three things a new CISO should do

Congratulations: You're the new chief information security officer for an organization. In this time of increasingly successful cyber attacks, on...

February 4th, 2020 Howard Solomon