Academic Institutions Get FREE Web Endpoint Security from EdgeWave


Schools, Universities, and students are faced with the same online dangers and threats that wreak havoc on the world’s largest enterprises. Unfortunately, academic institutions frequently do not have the resources to fight these new and damaging cyber threats that are increasingly using remote and mobile endpoints as attack vectors.  

To make the internet a safe and productive learning tool, EdgeWave has announced the availability of EdgeWave Cloud Endpoint Security, a new cloud-based web security solution which is offered for FREE to academic customers.  Simple to install and deploy across student and staff computers, the cloud service powerful enterprise grade protection from APTs, including botnets, malware, viruses, and more.    Blocked website categories include adult content, copyright infringement, questionable content, and sites at risk of security exploits.

The new cloud-based EdgeWave Cloud Endpoint Security delivers proven web security to laptops, regardless of their location, without requiring VPN access or additional hardware.

Those interested to protect their student and staff laptops for free, can get more information and download instructions here —www.edgewave.com/cloudendpointsecurity.

A look at the evolution of social media (2008-2013)
The following infographic from Hootsuite delivers a great snapshot of the last five years of social media.  How it has evolved, the power that it brings and how it has impacted our lives as public relations professionals.

A look at the evolution of social media (2008-2013)


The following infographic from Hootsuite delivers a great snapshot of the last five years of social media.  How it has evolved, the power that it brings and how it has impacted our lives as public relations professionals.

Happy New Year!!

Wishing you all a wonderful, warm, safe, happy and healthy New Year and may 2014 bring you joy and happiness!

Wishing all a happy holiday season!!!

Wishing all a happy holiday season!!!

Wishing all a Safe and Happy Halloween!! Our very own Phife doing his best Testudo impersonation!! Go Terps!!

Wishing all a Safe and Happy Halloween!! Our very own Phife doing his best Testudo impersonation!! Go Terps!!

PR Pros: 10 Signs Your Boss Is Out Of Touch


By Chad Giron


#10. “Did you fax out the press release?”

(Cue Grumpy Old Man voice) BACK IN MY DAY, people actually used to fax out press releases. No, seriously. In the year 2000! Didn’t you ever wonder why Cision still includes fax numbers?

 

Fax Machine


#9. He or she still has a Blackberry. And, correspondingly, also perhaps a belt clip.

“I couldn’t live without a physical keyboard!”

Bases. Covered.


Bases. Covered.


#8. “Does this media list have the top 25 dailies?”


Uhm, are there even 25 total daily newspapers LEFT in this country? There are. But when the Honolulu Star-Advertiser has a higher average circulation than the Boston Globe, I wouldn’t sweat it too much.


#7. “Are we on MySpace? We should do something on The Facebook.”


The only person on MySpace is Justin Timberlake. Shh. Shh. Hush, now, social media illiterate. There will be plenty of time for you to discover Facebook when your children go off to college and you humiliate them by commenting on their photos and status updates.


#6. “Make sure you run the ad equivalency numbers for the client.”


Ad equivalency values are B.S
. Have always been B.S. and will always be B.S.


#5. “Let’s do a press conference!”


NO! NO!!! Here’s when you hold a press conference: when you hire a new head coach or you sign a bill into law. That’s about it. You hold a press conference, and your client expects this:

Expectation...


Expectation…


…but is much more likely to get this…


...vs. Reality


…vs. Reality


#4. “Where are the folders for the press kit??”


No reporter, especially at a trade show or conference, wants 20 folders worth of press kits to lug around. Put that stuff on a microsite or, if you must, a thumb drive. Hard copies, like cassette tapes and landlines, are so 20th century. Speaking of which…


#3. ”Did you do all of your call-downs?”


Gather ’round, all ye young PR pups born in the 1980s, and let me tell you of a time long past…when pitching required the strange, bygone tactic of picking up a telephone, dialing “9″ to get an out-of-office line, and actually calling a reporter with the goal of selling your story to them, via your voice…and your words…via telephonic communication! WHAT??? Yes!


#2. “I don’t tweet.”


Well…you probably should. According to MediaBistro, almost 60% of journalists worldwide are. Here’s a nice little article from Social Media Today to help you get started.


#1. “Did the client get their daily clips?”


Hey, PR kiddies, did you ever wonder why news articles that mention your client are called “clips”? Because back in the day, part of a PR person’s job (OK, usually the interns) was to actually read dozens of newspapers each morning – real, physical newspapers that get ink all over your fingers and everything – and cut out (or “clip”) articles that mentioned their client, paste these clips onto a sheet of paper, photocopy all of these articles and fax them to the client. It was called “doing clips”. It SUCKED. Google Alerts have made clips go the way of the Dodo.


** Editorial Note: clip books are so old-school, I can’t even find a picture of one online…


That’s my take. I ask you, my PR pro friends, what are some of your signs that your boss or a fellow PR person is out of touch?

We are just half way through National Cyber Security Awareness Month and each and every one of us needs to do our part to make sure that our online lives are kept safe and secure.  The last 10 years has seen major changes to our ability to access online content and with that, increased dangers.

We are just half way through National Cyber Security Awareness Month and each and every one of us needs to do our part to make sure that our online lives are kept safe and secure.  The last 10 years has seen major changes to our ability to access online content and with that, increased dangers.

National Cyber Security Awareness Month begins today! #NCSAM


National Cyber Security Awareness Month (NCSAM) – celebrated every October - was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.

Look for our tweets and blog posts this month!!!

Since its inception a decade ago under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown exponentially, reaching consumers, small and medium-size businesses, corporations, educational institutions, and young people across the nation.

This year, we are celebrating the 10th anniversary of National Cyber Security Awareness Month!!!!

- See more at: http://www.staysafeonline.org/ncsam/about

 

CEOs Help Themselves With A Social Media Presence


A great piece from PRNews on the value of a social media presence for C-level executives and how PR can help the disconnect that may exist with the perceived value.

————————————-

A recent report from CEO.com found that 68% of Fortune 500 CEOs have no social media presence. Interestingly, we wrote about another study showing that roughly 80% of director-level respondents indicated that their CEO would be open to coaching and counseling.

Think that’s a void that PR can fill?

The dearth of C-level executives on social media (and the simultaneous desire for counsel) represents an opportunity for PR pros to step in and help CEOs build a valuable presence on social channels.

In a recent issue of PR News, Anne Green, president-CEO of CooperKatz & Co. Inc., argued that PR should take the lead on social. “PR has rapidly ascended the curve on social, to where we now drive the leading edge,” Green said. “The multi-channel, multi-message nature of our work is perfectly suited to engaging heavily fragmented audiences.” There’s no reason why this shouldn’t apply to a CEOs Twitter or Instagram account.

Need some reaffirmation about why it’s important that your CEO develop a social media presence?

Richard Branson, the founder of Virgin Group, has more than 3.5 million followers on Twitter, and Bill Gates has more than 13 million.

Indeed, having your CEO on social channels can be a powerful brand asset. PR pros should seize this opportunity and make the push to get their C-level execs on board.

I enjoyed this and wanted to share…..
via fashionprdreams

I enjoyed this and wanted to share…..

via fashionprdreams

(Source: insidethepinknotebook)

Why thank you fortune cookie… 

Why thank you fortune cookie… 

ComicCon is right around the corner - who is your favorite Comic book hero?


With ComicCon coming to San Diego next week - San Diego’s EdgeWave is doing a quick survey to see who everyone’s favorite comic book super hero is.  Batman is currently in the lead with a strong push in the past couple days.

Vote here for your favorite here

I’m actually a Superman fan myself - ability to fly, shoot lasers out of my eyes, and strength of a thousand men, no brainer! 

Thought Leaders in Mobile and Social: Dave Maquera, CEO of EdgeWave

EdgeWave's CEO Dave Maquera recently spoke with security writer Sramana Mitra for her Thought Leaders in Mobile and Social (TLMS) interview series. During this interview, Dave talks about Edgewave’s unique approach to security solutions and addresses open problems in the industry.   In TLMS, Sramana interviews thought leaders in the mobile and social sectors with unique perspectives on how the mobile and social industries are evolving. The series is part of the One Million by One Million (1M/1M) global initiative, whose aim is to help a million entrepreneurs reach $1 million in revenue and beyond.

This is part one of a series which will be published over the next several weeks.  To see the interview, please visit the 1M/1M blog!

——————

Sramana Mitra: Dave, let’s start with setting some context about what EdgeWave does.

Dave Maquera: EdgeWave is a web and email, social media and mobile security company. We are about 110 folks in the company and we have around $18 million in revenue. The historical focus of the company has been primarily on web gateway and web filtering capabilities. In 2010 we added an email filtering – spam filtering – capability and have since augmented both products and leveraged what we saw as strategic in our e-mail acquisition, which was a cloud architecture that is highly scalable and extremely cost-efficient, whereby we could continue to offer security capabilities to mobile devices and globally distributed organizations in a high-security demand environment, which is highly flexible and cost-efficient. We started off several years ago. As a matter of fact, the core company St. Bernard was one of the first web filter appliance companies – about 15 years ago. Since we started back then, the company has rapidly changed in the last few years to adopt what we believe are game changing technologies to secure the environment.

SM: What is special about mobile security?

DM: The most obvious thing is a physical difference. Most mobile devices are used by people outside of the physical perimeter of the corporate network or the enterprise where they are employed at. The whole idea of a PC on a LAN that is secured through a single firewall has gone away. When you are on a mobile device, you are not only connected to your carrier’s voice network, you are also connected to your carrier’s SMSC, which is the short messaging and mobile messaging system. You are also connected to the mobile Internet, which goes through their network, goes out to the web and goes back to whatever focus you are touching on the other side of your corporate or institutional group. So it is completely different. You have to think about “How do I secure my data? How do I prevent malware intrusions and attacks? How do I really maintain compliance with key policy and regulatory items, now that I am way outside of all the historical safety measures that were behind the perimeter?” That is why it has changed dramatically.

SM: The particular problem you are solving is mobile security in the context of the enterprise?

DM: I would say it is not a particular problem. The way we look at it is that there are lots of problems rolled up into this use case of having a mobile device that you probably own personally. Statistically, most mobile devices that people use to interface with their enterprise or company are not issued by the company. That is one piece of it, but all the touch points that I talked about are several problems by themselves, and they have to be managed. The way we look at it is that we manage web and e-mail security through that entire extended network through which people are now connected to each other through mobile devices. We still do web filtering in the enterprise and simultaneously out to your device. We still do policy compliance within the enterprise, but also out to your device – wherever you are. So it is across the entire ether of what the corporation or enterprise now is, by virtue of having mobile devices connected through the web. It is not a particular focus. We still do all the things we used to do, but we added key technologies and approaches to how we manage that on behalf of our customers.

—————————-

Look for part two of the series coming soon!

Phishing — Leaves The Onion Lost at SEA


via EdgeWave

It seems high-profile social media hacks are all the rage. The organization taking credit for some of them, including the attack last week on 
The Onion, calls itself the Syrian Electronic Army (SEA). The Onion, for the few who don’t know, is a satirical news site that specializes in funny fake news stories. So it’s not surprising that some people doubted they’d been hacked at all – coming as it did on the heels of the AP Twitter attack.  However, The Onion hacking gained credibility after they wrote about it on their technical blog – one that’s not as widely visited as their main news site.


Even more surprising, SEA wasn’t using some next-generation hacking technique that makes stopping these attempts so challenging – they used good, old-fashioned phishing!  Phishing and its close relatives spear-phishing and whaling have been around since the 90’s. They are tried and true methods that remind us of our vulnerability and caution us to remain vigilant.

According to The Onion blog, SEA phished Onion employees’ Google Apps using 3 different methods:

  • First, they sent out phishing emails to some Onion employees, but only a few so as not to raise suspicions, asking them to read a Washington Post story.  Those who clicked on the link were redirected to a URL where they were asked to enter their Google credentials. One Onion employee fell for this stage of the attack.
  • Once they gained access to the employee’s account, they used it to send emails to other Onion employees. Now they had their phishing emails coming from a known sender, increasing the odds someone would respond.
  • Two employees entered their credentials and one of them had access to all of The Onion’s social media accounts, and the rest is history.

    Read the entire blog

In their blog about these events, The Onion included some tips under “Don’t let this happen to you”, including, educating users to be wary of links that lead to login requests; isolating Twitter email addresses from other organizational email; using strong passwords; and having a way to reach your users outside the organization’s internal email accounts.

However, another critical component of effective security measures is technology that can mitigate risks before they turn into damaging breaches. EdgeWave has solutions that offer multi-layered protection against the risks associated with social media in the workplace as well as award-winning solutions that defend against email-borne threats.  EdgeWave Social offers granular control over social media interactions that allows you to monitor and block content based on policies and rules you establish.  You can use the templates included in the solution or write your own unlimited rules. EdgeWave’s ePrism Email Security includes proprietary Zero Minute Defense, which can detect and block spam, malware and phishing exploits in close to real time.

Learn more about EdgeWave Social

Learn more about ePrism Email Security

AhnLab Survey: 78% of IT Professionals Admit Picking Up and Plugging In Abandoned USB Drives

AhnLab, South Korea’s largest IT security vendor, has revealed that 78 percent of IT security professionals have admitted to picking up and plugging in USB flash drives found abandoned or lying around.  This goes against all the rules and warnings these professionals try to drum into their own colleagues inserting a “found” flash drive into a network lead to infecting files and networks, and ultimately, the loss of valuable data.

The study, which was conducted at last month’s RSA Conference 2013 among  300 IT professionals    many of whom were security experts —,   found that data  which was discovered on the “found” USB drives often  included viruses, rootkits, bot executables, movies, music and other office documents.

The study also uncovered that more than 68 percent of those surveyed had been involved in a security breach, either at home, work or personally – with many relating back to the infected USB drives.

 “I am utterly shocked at these figures, in particular, the 78 percent number,” said Brian Laing, VP of marketing and business development, AhnLab, Santa Clara.  “For example, Stuxnet, one of the world’s most sophisticated cyber-attacks, gained access to its target system through a ‘found’ USB drive.  The creators of the malware left infected USB drives near a uranium enrichment facility and someone picked it up and inserted into their PC.  Stuxnet derailed the efforts of that nation to purify nuclear materials at its facility.”

According to Laing, IT security professionals are clearly ignoring basic rules and this must stop.  An infected USB drive could result in infected machines, infected networks, and a PC or PCs in the network converted to a bot for use by cyber criminals.  The result could include stolen intellectual property, such as sales forecasts, customer, and financial information.  The list is endless.

“I urge IT security professionals to begin practicing what they preach,” said Laing.  “This ‘it won’t happen to me’ attitude doesn’t wash.  It really does come down to the old mantra of combining people, process and technology – if you can get all three elements right, you are on track to a safe and secure environment.  “