Our people weigh in on the issues of the day.
Blue Slate's people think a lot about the challenges facing their industries today. In the process, they often come up with completely unexpected slants on current issues, or new ways of thinking about business problems. Bluespeak is where they share those thoughts. Feel free to read and reflect.
[Any views or opinion represented in this blog are personal and belong solely to the blogger and do not represent those of Blue Slate Solutions.]
The Internet is full of examples of simplifications creating vulnerabilities. A good number of these can be represented as indirection enablers. IP addresses, domain names, URIs, tiny URLs, QR Codes and now Microsoft tags. Each of these serves the purpose of simplifying and decoupling. We have seen many exploits for the first four, what about these last two?
As you likely know, QR Codes and Microsoft tags are graphical images targeted at print media, though there is no reason they can’t be used in an online fashion. They are most often presented as rectangular graphics (examples below). The reason for using them is to provide an easy way for someone to access a web page (or other online resource) related to the printed content. Since these images represent character data they can also be used to house information, like contact details, that do not require online access to interpret.[Read More] 2010 National Cybersecurity Awareness Month
Welcome, October. There is a chill in the air here in the Northeast and visions of goblins, witches and ghosts are beginning to appear in front yards and on rooftops around the area. Although most of us associate these ideas with the paranormal, those same visions and chill serve to remind us to be ever vigilant when it comes to computer-based threats. So what better time of year than now to turn our attention to on-line phantoms such as viruses, worms and trojans?
The National Cyber Security Alliance chose October as National Cybersecurity Awareness Month (NSCAM). Their website contains a lot of useful materials for businesses, educators and parents. This is a great resource to use as the basis for informing your company, family and self about on-line risks and effective practices for protecting yourself and others from on-line threats.[Read More]