• Skip to main content
  • (617)933-5060
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
Facebook-f Twitter Linkedin-in
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

Archives for November 2016

20 questions to ask about your IoT security

November 22, 2016 by securewebsite

 

With the recent DDoS attack that utilized IoT devices to shut down major internet traffic, security of these devices is in the spotlight. The market continues to grow with devices filling up our smart homes, cities and businesses. You may be concerned about your lack of a testing procedure for these. Or maybe you have one defined but want to know if it’s sufficient. Below you’ll find 20 questions to ask when testing the security of your IoT devices, based on the Open Web Application Security Project (OWASP), which put forth excellent testing guidelines for securing Internet of Things devices. For more detailed information, stop on by the OWASP website or give us a call.

  1. Are weak passwords allowed?
  2. Does transmitted info use HTTPS?
  3. Will the account lock a user out after multiple failed logins?
  4. Is the web interface vulnerable to XSS, SQLi or other web app vulnerabilities?
  5. Is two-factor authentication implemented?
  6. What are password recovery mechanisms?
  7. Do passwords expire?
  8. Can a user change the default username and password?
  9. What personal information is collected?
  10. Is personal data encrypted both at rest and in transit?
  11. Is data de-identified?
  12. Lack of Transport Encryption
  13. Is a firewall option available?
  14. Are security events logged?
  15. Can you enable AES-256 encryption?
  16. Is there an unnecessary USB port that would allow physical access?
  17. Does it have update capabilities, and when it updates, are the files encrypted?
  18. Prior to installing, does the device require signed files?
  19. How does it respond to buffer overflow or denial of service attacks?
  20. Are any test ports present?

Filed Under: Small Business

CompTIA reports that top 2 priorities for business data are faster decisions and reducing costs. What are yours?

November 22, 2016 by securewebsite

Filed Under: Small Business

Do you cover up your webcam? Because the FBI Director does!

November 21, 2016 by securewebsite

Do you agree with the FBI Director? Do you think it’s sensible to cover your webcam?

Filed Under: Small Business

Heard of the Data Breach Insurance Act? The bill grants tax credits for breach insurance and NIST cybersecurity.

November 18, 2016 by securewebsite

Snag a tax credit and secure your business data: that’s the idea behind Congressman Perlmutter’s Data Breach Insurance Act. The bill would give you a tax credit if you purchase data breach insurance and adopt NIST’s Cybersecurity Framework. Did you know there’s a cyber insurance market?

Filed Under: Small Business

Did you know that Google’s doubled its share of the public cloud market since 2015? Watch out, AWS and Microsoft!

November 17, 2016 by securewebsite

Filed Under: Small Business

This is a fascinating list from IBM. The Top Analyzed Big Data: 1. Transactions; 2. Log data; 3. Events; 4. Emails; 5. Social Media.

November 16, 2016 by securewebsite

This is a fascinating list from IBM. The Top Analyzed Big Data:

  1. Transactions
  2. Log data
  3. Events
  4. Emails
  5. Social Media.

How does their list compare to what you’re logging?

Filed Under: Small Business

« Previous Page
Next Page »
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

© ORAM Corporate Advisors 2019. All rights reserved | Policy & Privacy