Visionary standards | Innovative solutions | Reliable services | Challenges met | Black Horse offers a full line of managed and professional network security solutions, including vulnerability assessments, penetration testing, incident response and customized services to help our clients identify, understand, and effectively deal with security issues before and after they occur.
Wednesday, October 28, 2009
Server Management
And that means at peak all the time, not just when you're IT organization can pencil you in. That means your IT should be telling you how your servers are doing, how your firewalls are doing, and how your internet is doing.
And do it 365/24/7.
When you have a problem, does your IT organization notify you? Or, do you notify them? And hope they have a technician available to address your problem?
Black Horse incorporates remote monitoring and proactive management to ensure that you maintain your competitive edge, increases your server availability, and helps keep you agile and responsive to changes in your marketplace.
Wednesday, October 21, 2009
Disaster Recovery
Black Horse can assist you with any of the following: Criticality Analysis, Business Continuity Planning, Crisis Management, Emergency Preparedness.
Monday, October 19, 2009
Information Security
Black Horse offers a full line of managed and professional network security solutions, including vulnerability assessments, penetration testing, incident response and customized services to help our clients identify, understand, and effectively deal with security issues before and after they occur.
Thursday, October 15, 2009
Hacking: Delta Airlines Sued
Tuesday, October 13, 2009
ODIN Off To Slow Start
From February 2007 to January 2008, the original ODIN, based in Iraq, helped take out more than 2,400 enemy bombers. Many credit the group with being one of the decisive forces in drastically reducing what had been a horrific roadside explosive campaign in Iraq. ODIN brought together IT gurus, image analysts, and drone pilots with attack helicopter forces charged. The networked operation was able to spot bomb planters, transmit the coordinates quickly, and strike.
Tuesday, October 6, 2009
Online Crime: Up 600%
The Anti Phishing Working Group's (APWG) latest report shows that rogue anti-malware programs, infected computers and crimeware broke new records in the first half of 2009. The report shows that criminals are innovative and have "apparently unchecked ambition" with crimeware designed to target financial institutions' customers.
Most disturbing for financial institutions are the attacks against corporate bank accounts, says APWG's Chairman Dave Jevans. "These attacks target the CFOs and then attempt, sometimes successfully, to take over the corporation's online banking credentials to make corporate wire transfers."
This attack trend has grown to the level that industry associations, including the Financial Services Information Sharing and Analysis Center (FS-ISAC) and NACHA along with banking regulators, sent out alerts to their financial services members this summer.
"Before this, phishers targeted individual users, not corporate accounts," Jevans says.
The report also shows:
- The number of unique phishing websites detected in June rose to 49,084 -- the highest since April, 2007's record of 55,643, and the second-highest recorded since APWG began reporting this measurement.
- The number of hijacked brands ascended to an all-time high of 310 in March and remained at an elevated level to the close of the half in June.
- The total number of infected computers rose more than 66 percent to 11,937,944 - now more than 54 percent of the total sample of scanned computers.
- Payment Services became phishing's most targeted sector, displacing Financial Services. Jevans notes that institutions' customers still are a primary target of electronic criminals.
"The Internet has never been more dangerous," Jevans says. "In the first half of 2009, phishing escalated to some of the highest levels we've ever seen."
Of even greater concern is the skyrocketing sophistication and proliferation of malicious software designed to steal online passwords and user names. The number of banking trojan/password-stealing crimeware infections detected increased more than 186 percent. "New malicious software such as the Zeus trojan exhibit a level of sophistication that would make the best software programmers envious," he says.
This post is excerpted from the BankInfoSecurity article, Online crime up nearly 600% in '09, by Linda McGlasson, October 5th, 2009.
Monday, October 5, 2009
Lack of eHealth Standards Costing Lives
Hundreds of billions of gigabytes of health information are now being collected in EMRs, and three-quarters (76%) of more than 700 healthcare executives recently surveyed by PricewaterhouseCoopers LLP agree that mining that information will be their organization's greatest asset over the next five years, both for saving patient lives and saving money.
The executives surveyed cited "legal implications" as their greatest concern when it came to their organizations' use of secondary data, followed by privacy implications and public relations ramifications. Nearly two-thirds (62%) of executives surveyed agreed that individual and/or identifiable data can be re-used if it is in the best interest of the patient.
When asked about the barriers to secondary use of EMR data, the majority of those surveyed cited problems surrounding data, including access to electronic health records, transparency, quality and management. Fewer than half of providers, for example, have fully implemented all but the most basic functions of electronic health record.
An insufficient level of detail and integration tied with data timeliness were cited as the next two biggest problems in using secondary data. Variability in data entry makes many stakeholders, especially doctors, question the quality of the information being generated by the IT system.
While the portability of electronic patient data is most often hyped as the greatest benefit to implementing EMR systems, mining healthcare databases to track national health trends as well as to alert physicians to a particular patient's pending health problems will not only save lives, but cut long-term costs by catching diseases and infections early. By catching them early, the impact can either be negated all together or minimized.
For example, since implementing a sepsis alert system more two years ago, about 4,000 lives have potentially been saved through the efforts at Methodist North Hospital (MNH) in Memphis. The hospital's EMR system alerts doctors and nurses to patients suffering from the sepsis an often deadly systemic infection that can be very difficult to diagnose in its early stages. Methodist Healthcare system, includes three adult-care facilities that also use the sepsis alert system.
This post is excerpted from the NetworkWorld article, Report: Lack of eHealth standards privacy concerns costing lives, by Lucas Mearian, October 2nd, 2009. To read the article in its entirety, visit NetworkWorld.