Posts

Showing posts from May, 2023

Establishing Strong Policies and Practices: Never skip on security

  Gift cards incentivize customers to engage in business with any company. Gift cards can be purchased in bulk, cannot be tracked, can be easily sold online, and can be exchanged just like cash. A business implementing a gift card purchase system often focuses on a quick and simple customer experience that will boost sales; however, companies often postpone implementing secure policies and practices in a last-minute gift card campaign designed to make a quick buck (Malteseva, 2023). A low dedication to security when creating gift card promotions makes gift cards a prime target for hackers. On November 4, 2022, to February 27, 2023, Nordik Spa in Ontario, Canada, suffered a significant data breach in their gift card payment system that distributed customer credit card numbers and personal information to a third party that resulted in numerous unauthorized charges to customer credit cards (Shebahkeget, 2023). Gift cards provide a lucrative attack point for hackers. When offering gift...

Secure Connections: The Handshake That Saves Your Data

We live in an age where the internet has integrated into our daily lives. Children start using the internet before they can understand internet safety, the older generation picks up new skills to adapt to changing times, and the COVID epidemic encouraged remote work and home shopping that increased internet use for daily functioning (Shbair et al. l, 2020). Developing secure networks promotes trust between the software developer and the public. While a software developer could create networks that overlook the importance of using a secure protocol, the HTTP clear text format leaves unsuspecting users vulnerable to having their images, data, and private information altered and stolen. Creating secure communication channels protects the user and prepares a website to expand to include forms that collect sensitive data, protects personal photographs, files, and data that dangerous hackers should not have access to, and begins to create an industry standard that discourages dangerous hacke...

Certificate Authority: Ensure the Circle of Trust

With an increase in technology large companies constantly face confidentiality threats when outsiders attempt to intercept important trade secrets by circumventing attempts to ensure a secure authentication process through the use of digital signatures and digital certificates. In What is cryptography? How algorithms keep information secret and safe, Josh Fruhlinger asserts: “ In general, in order to function securely, the internet needs a way for communicating parties to establish a secure communications channel while only talking to each other across an inherently insecure network” (Fruhlinger, 2020). He suggests a dire need to secure communication channels between communicating parties to address insecure internet concerns. Cryptography allows programmers to utilize mathematical operations to restrict access to sensitive messages that desperate criminals constantly seek to intercept. Government and financial institutions strive to ensure confidentiality through the use of cryptogr...

Scrum Product Development: Team Work Makes the Dream Work

Image
Team interactions often determine the success of a company. Fowler acknowledges the role of team interactions in the larger corporate structure: "The Scrum Framework is built on an extensive theoretical base that ranges from systems analytics to team interactions and human behavior. Ken Schwaber and Jeff Sutherland put the pieces together during the 1990s, but its theoretical roots go back to at least the 1980s and, arguably, back to the 1950s as well" (Fowler, 2019). He suggests an extensive theoretical base supports the Scrum Framework in improving team interactions and modifying human behavior. Agile Methodology implements an iterative, incremental approach to software development. Companies often create Scrum teams as an implementation of Agile Methodology. A company contains multiple positions and departments. A scrum team is an isolated system from the rest of the company. Orders come from the company roles above (Bloomenthal, 2023, p. 1). Figure 1 Corporate Comp...

Cybersecurity: Phishing Season is in

The world is becoming more and more dependent on technology. Corporations worldwide use technology to store information about individuals and companies. Technology undeniably provides numerous advantages; however, unintended access to private information becomes a constant concern as corporations increase the technology in their IT stacks and store more and more sensitive information. The threat environment will likely become more complex with increased technical exploitation, social engineering, and data leaks. Hackers have evolved and now include sophisticated organizations that frequently compromise customer data. To remain effective, attackers continuously discover new attack vectors. Technical exploitation increases as technology becomes more integrated and powerful. Hackers gain knowledge through learning how technology works. While policies and regulations help reduce the attack surface, they only protect against specific attacks. Hackers adapt by finding new attack vectors to g...