Monday, August 10, 2015

How to Block Every App on Facebook at Once

Facebook logo
Facebook logo (Photo credit: Wikipedia)
This article will tell you how to block every app on Facebook at once by disabling Facebook's apps platform.  By doing this, you will no longer have to worry about any website stealing your Friends List, emails, birthdays, photos, or anything else.  No more Bubble Witch, Farmville, or Candy Crush invites, no matter how many new versions of the games are released.  No more TimeHop or so many other diversions taking up valuable space on your Newsfeed.

On the downside, you will no longer be able to use your Facebook login to log into other websites (this is better for security anyway).  You also will no longer be able to post photos automatically from your camera.

Select the "Settings" item
from the drop-down menu.
You will still be able to post Facebook ads for your business.  You also, as of this writing, will not lose any old photos or posts from apps that were made previously (though Facebook claims that you will in their warning message).

Monday, June 8, 2015

Virus Infected Medical Diagnostic Machines Help Leak Patient Data

With the advent of computerization, even the most basic medical devices often boast computing power several times the standard computers of the 1990's.  X-Ray, MRI, and other monitoring devices have gone digital, with the ability to save and store copies of patient scans.  Typically isolated from the outside world on secure corporate  networks, security is not always the first thought when design image storage for an MRI machine.  Unfortunately, a recent report from security consultancy TrapX has revealed that these digital storage spaces can be misappropriated  by viruses which have made their way into corporate networks.  After viruses, malware, and other softwares installed by criminals and hackers have been eradicated from office computers and tablets at a medical facility, reinfection may still occur as a result of these hidden copies of the virus, lurking among patient data.

Wednesday, April 1, 2015

How to Secure Hospital Technology - HCCI-215 Session 6

We've previously discussed how some healthcare organizations are putting private files on search engines, unaware that they are doing so, how others are leaving private information in public press releases and photos, how hackers can steal or reconstruct a corporate email database, and more.  This entire work has been, not a 10,000 foot view, but in-depth review for the average computer user of the endless ways that healthcare organizations can mistakenly arm the criminals and competitors looking for security holes to take advantage of.  Now, we'll pull all that knowledge together into a timeline for a potential hack.  Though the following scenario may strongly resemble actual hospital data breach cases, the details are mere speculation, intended to demonstrate how these techniques are used to bypass hospital technology security measures.

Friday, March 27, 2015

What Breaking Bad Can Teach Us About Business Ethics

Are financial criminals like drug dealers?  Do MBA students, mailroom clerks, IT professionals, Directors of Finance, and a host of other professionals carry some "Seed of Evil" within them?  Vanity Fair and FBI profiler, Candice Delong, examined Walter White's precipitous descent from educator to drug kingpin.  Their findings suggest that strong parallels can be found between that Hollywood drama and the true-lives of many business professionals turned criminal.  As we'll discuss, white-collar criminals nearly always find justification for their actions in their own minds and are seldom motivated by money alone.

Tuesday, March 24, 2015

How to Turn an Email Server Rogue - HCCI-214 Session 5

Can your email server be programmed for evil?  Chances are it's already happened!

It may sound like a pulp 60's spy novel, but the truth is your technology can be turned against you at any time.  Whatever benefit any automated system provides to your organization, there are those who would like to subvert its automatic behavior to their own nefarious uses.  Having laid the groundwork in previous sessions for the potential methods that a competitor might use to gain access to confidential strategic data at your organization, we will now begin to pull resources together into what a real life attack might look like.