Breach fatigue

I heard a term yesterday that frightened me – Breach Fatigue (being in the Security business can make one paranoid).

As a leader in Security technology solutions for ERP, we’ve talked to thousands of organizations about their Security protocols. Many get it and are fully committed to implementing technology and best practices to protect from internal and external breach.

I said ‘many’….unfortunately, I can’t say ‘most.’

Read more…

Scary UK cybercrime data

Companies, higher education institutions, healthcare organizations are not only fighting organized cybercrime rings (makes the Mafia look like a cottage industry by comparison) but also nation states with virtually unlimited funding.

Read more…

Allocation of risk in a data breach

We’re getting closer to a tipping point where organizations are going to have to prove conclusively to their customers, lenders, investors, shareholders that they are doing everything they can to secure their sensitive systems/data.

Read more…

Fluid UI– How to Deploy Safely & Securely– Webinar Recording

Fluid UI– How to Deploy Safely & Securely from GreyHeller on Vimeo. GreyHeller's Executive Director of Security Solutions, Greg Wendt, leads a demo-intensive session showing how organizations can deploy fluid transactions safely using the following techniques: Location-based security Two Factor Authentication Field level masking Logging and Analysis Utilization of Mobile Device Management solutions

Read more…

Cyber Criminals Targeting University Payroll Systems

August 26, 2014 – San Ramon, CA – According to a recent advisory issued by Research and Education Networking Information Sharing and Analysis Center (REN-ISAC), Higher Education faculty and administrators are being targeted with sophisticated spearphishing attacks. Cyber criminals harvest credentials and then alter victims’ payroll bank account information to re-route direct deposits to bank accounts controlled by the cyber criminals.  Tactics, techniques and procedures (TTP’s) of the cyber criminals include: Altering direct deposit account information Spoofed to appear as if message came from the appropriate department, e.g. HR for “salary increase” lures or IT department if “mailbox exceeded” Spoofed login screens that are a close replica of legitimate login screen Targeting of faculty and staff Using university images within

Read more…

Webinar Recording: GreyHeller and Fluid UI

On November 5, 2014, OHUG sponsored the webinar: GreyHeller and Fluid UI– The Best of Both Worlds. GreyHeller’s Responsive Design technology for Mobile and Desktop has been very well received by PeopleSoft customers. PeopleTools 8.54 Fluid UI makes PeopleSoft 9.2 pages responsive for Mobile and Desktop. GreyHeller’s Responsive Design technology has been built to be complementary to Fluid UI. To see a recording of the demo, please visit:  

Read more…