With finite resources, companies large and small often take an “it will never happen to me” approach to data security concerns. In a recent ZDNet article*, security experts echo the fact that company directors are learning about security the hard way. Though directors typically realize that managing liability is part of the cost of doing business, proper weight is not always given to that fact that extraordinary liabilities like hostile workplace suits, negative public relations and the negligent disclosure of personally identifiable information can go a long wa... [More]
The Obamacare website was not only riddled with errors, but it also came with a huge price tag: $600 million. Most of us in IT cringe because we have had our own - hopefully mini - IT disasters. But with that kind of funding, one can only scratch their head and ask why this wasn’t outsourced to a US company with a track record of competence. Why not IBM, HP or NYXT, the chief architects behind the single fault tolerant systems designed for the NYSE? Why not hire the beleaguered NASA; they’re pretty incredible at getting the impossible done. Why not tap... [More]
MNsure is one of the new state lead central marketplaces where Minnesotans can get health insurance and access tax credits or assistance to help pay for coverage. In September, the Social Security numbers belonging to about 1,600 insurance agents were accidentally disclosed by an MNsure employee. MNsure executives were quick to point the finger and blame the breach on a new employee who accidentally emailed the information.
To the rescue Jim Nobles, Minnesota legislative auditor...
Nobles and his team plainly shifted responsibility for the breach to MNsure management... [More]
Malware that doesn’t hit your hard drive is the focus of a new watering hole attack. A watering hole attack is a targeted assault on a specific group of users - be it an organization, location, belief system, etc. The attacker determines what websites the target group visits and infects the site with malware. It has been reported that attackers have embedded malware in “a strategically important [US] website” which exploits known vulnerabilities in Microsoft’s Internet Explorer. Unlike most drive-by attacks, this threat does not get saved to the ... [More]
The initial roll out of the Healthcare.gov site has been the focus of plenty of media attacks. It is now the focus of Cyber Attacks. There is a distributed denial-of-service (DDoS) attack tool that's being advertised for download on social networks that aims to overwhelm the Healthcare.gov website. The application is reported not to be a virus, Trojan or worm. The purpose is to overload the #ObamaCare website by repeatedly opening multiple links to the site. Pearl Echo users can block this download in a number of ways: Setting FTP to “Block All” will also bl... [More]
With nearly 100 percent of school districts having internet access and a majority using them for educational purposes with student access, web filtering software has become an integral part of the community and legal mandate to protect students from harmful material on the Internet. The majority of school districts across the country have moved beyond simple internet access to making the web a vital student education tool. From student assignment research to distance learning and one-on-one teacher support for students within and outside of the classroom, schools are racing to take advantage o... [More]
We are excited to announce that Pearl Echo Version 11 is now available!
Version 11 of the Pearl Echo line of products includes features and full support for Microsoft’s Windows 8 and Windows Server 2012 operating systems. In addition to working in the traditional desktop mode, Pearl Echo Version 11 supports management of Internet activity in the Windows 8 tile mode, without requiring added configuration of modifications by the end user. Like its predecessor versions, Pearl Echo runs quietly in the background, allowing organizations to monitor and filter end-user Internet a... [More]
The 2013 holiday season is approaching, and with that comes an increase in emails from retailers and businesses looking for you to visit them and make a purchase.
Unfortunately, this time of year also brings a large increase in spam and hack attempts that arrive in your inbox along side those fun retailer emails. These emails are also known as “Phishing” emails.
Whether you are on a corporate network or personal network you will be putting yourself at risk by opening these fraudulent emails. Phishing emails are getting harder and harder to differentiate from legitimate emails a... [More]
Pearl Software, a leader in internet monitoring software, is exited to announce the launch of their very first Scholarship Program benefiting a current technology student in any university or accredited college.
Simply submit an essay on one of the 2 topics below and you can win a $500 scholarship that will be payable directly to your school for either books or towards tuition.
Personal use of the internet, social media and texting in the workplace - is it a right, a benefit or a mistake?
The proverb, "The road to Hell is paved with good intentions" is said to date back to the 12th centu... [More]
More and more personnel want to bring their own mobile devices to their places of employment, posing quite a dilemma for employers in regards to data security and risks. With Android operating systems proving to be growing in popularity, it is imperative that businesses evaluate their security measures for Android based devices that are owned by employees or supplied by companies.
Utilize the Google Apps Device Policy administration app. This app is a great first step that allows IT administrators to enforce enterprise security policies and will even allow a corporate Android to be remotely wiped clean. It should be the first thing installed on any employee device that will be used on the company network. This feature will allow the administrator of the Google account associated with it to set remote access rights. This is great for tracking devices on the network as well as lock and erase devices remotely which is wonderful for devices that have been lost or stolen. [More]