Happy Habits

In this day and age of lots to do and multiple devices to do it on, you might sometimes feel stressed. After watching family members, co-workers, and random strangers in the grocery store, gym, and other gathering places, I’ve come to the conclusion that we need more happy habits. Sure, most of us have developed some pretty good habits, but they’re not always happy habits. Often times, they’re more like responsibilities; you know, the kind of things we have to do (like cleaning the bathroom) or we’re supposed to do (like going to the gym every day. Or maybe that’s every other day?).

As I was thinking about my stress levels, I started making a mental list of my happy habits. It wasn’t long before I thought about one of my favorites: eating See’s candy. (Yes, I readily admit that my See’s habit is one of the reasons I go to the gym.) I have been enjoying See’s candy since I was a little kid. And when I say little, I mean little. Both sets of grandparents introduced me to the delights of See’s when I was just old enough to walk. Now that I look back on those early days, that’s probably why I learned to walk: “Brian, come here! Come on, walk to grandma! Come and get a piece of See’s!” Once I figured out what See’s was, I needed very little encouragement to walk.

One of my earliest and fondest memories of enjoying See’s candy was riding in my grandfather’s 1953 Chevy Bel Air 4 door to pick up my grandmother, who worked part-time at the nearby department store. This was in the days when seatbelts weren’t mandatory, so we kids were like dogs with our heads sticking out the windows, enjoying the cool Southern California breeze blowing in our faces. Picking up grandma also meant treats from See’s. Grandma would be waiting by the curb with a small white bag of those wonderful butterscotch lollipops.

On the drive home, my grandfather would honk the horn (which embarrassed my grandma, which only encouraged my grandpa to honk even more) any opportunity he got. Us kids thought it was the funniest thing in the world. It didn’t seem that life could get any better than those moments. Cool breeze, butterscotch lollipops, laughter, and being with grandma and grandpa. Those were good memories—happy memories to be sure. And that’s what I’m talking about: first, always be aware of opportunities to create happy moments with the ones you love. And then develop the habit of looking back to relive those good feelings when you’re feeling stressed. And even when you’re not stressed, happy memories make today a lot better, and they make our tomorrows a lot more enticing. While it’s true that you can’t relive the past, the sweet habits we’ve created because of them can sure help us minimize our stress levels. For me, a butterscotch lollipop confirms that.

Could Your Data Be Hijacked and Held for Ransom?

Hospitals were on edge recently when the Hollywood Presbyterian Medical Center was hit by cyberterrorists. After all, if this Los Angeles hospital’s information could be held for ransom, why couldn’t another’s? Which is, in fact, the reality: any organization, including medical, government, education, industry, etc. can be the target of a ransomware extortion plot.

If you didn’t hear about the incident, here it is in a nutshell: Hollywood Presbyterian Medical Center is an acute-care facility with physicians representing a wide variety of specialties, from cardiac and cancer care to fetal therapy and maternity services. A few weeks ago hackers hijacked the hospital’s computer system, preventing access to any data by encrypting it. Initially, hackers demanded $3.6 million in return for releasing the data. Although the attackers later decreased their demands to 40 bitcoins (worth $17,000) in exchange for a decryption key, they had made a point to the world: patient data and medical records are not safe from hackers.

A sobering lesson can be learned (again): important data must always be protected. Hackers don’t necessarily care who the data belongs to; they will do their best to exploit any weakness in the IT infrastructure to steal, damage, or hold for ransom an organization’s data. Like most criminals, cybercriminals are opportunists who seek out easy targets. Are you an easy target? Just for starters, consider this: Is your data unencrypted? Do you employ password protection policies? Are you using expired antivirus software?

Fortunately, organizations can safeguard their data by backing it up to the cloud. The more secure your data is, the more likely are cybercriminals to look elsewhere for better odds of accessing important or sensitive data. Don’t let your data become vulnerable! So, when looking for a service that backs up to the cloud, what should you expect? There are many points to consider, including the following:

•     Is your data encrypted in transit and at rest?
•     Do you have the option to use your own encryption keys?
•     Are backups automated?
•     Is the cloud service audited and certified?

Finally, ask yourself this question: In the event of hardware failure, theft, virus attack (including a ransomware extortion plot!), accidental deletion, or natural or man-made disaster, will my data be safe and recoverable quickly?

Organizations rely on digitized data more than ever. As such, all organizations—from the smallest business to the largest enterprise—must take the necessary steps to ensure that their data is securely backed up, accessible, and easily recoverable.

 

Most Prolific Hackers (infographic)

Money. Power. Politics. A new Porsche. Any one of those can be sufficient motivation for a hacker to ply his trade. These days, even with the most sophisticated security in place, hackers continue to break through the inner sanctums of government, industry, and business to steal secrets and other sensitive information like weapons technology and credit card numbers. These guys are so good that some end up making a legitimate profession by using their hacking skills. Let’s take a look back to learn about the most prolific computer hackers and the motivations behind their exploits.

As long as there have been computers, there have been hackers. Through the use of computers to gain unauthorized access to everything from radio station phone lines to government agencies, hackers have a wide variety of motives for their actions. Join us as we list the most prolific hackers to date.

Alias: The Homeless Hacker
Name: Adrian Lamo
Country of Origin: USA
Current Status: Threat analyst
Agenda: Unkown

Best Known For:

Using coffee shops and libraries as his command centers, Adrian earned his alias by hacking into The New York Times, Google, Yahoo! and Microsoft.

After an arrest and 6 months of house arrest in 2003, Lamo became an American threat analyst. He was one who turned in U.S. soldier Bradley Manning (now known as Chelsea Manning) for leaking thousands of government socuments, which shined the spotlight on the now infamous WikiLeaks website for the first time.

Alias: ASTRA
Name: Withheld from public
Country of Origin: Greece
Current Status: Inactive following arrest in 2008
Agenda: $$$

Best Known For:

This hacker has never been publicly identified, though it is suspected he was a 58-year-old math teacher. Astra spent over half a decade hacking into the aviation company Dassault Group’s inner sanctums to steal and sell weapons technology information.

Alias: Dark Dante
Name: Kevin Poulsen
Country of Origin: USA
Current Status: Senior editor for Wired magazine
Agenda: A new Porsche 944 S2

Best Known For:
Being the first American to be banned from the Internet and computers for 3 years after his release from a 5-year prison sentence for hacking.
Poulson hacked the phone lines of a local radio station to rig a competition in which he would be the 102nd caller, winning the grand prize.

Alias: Cumbajohnny, Segvec, Soupnazi, Kingchilli
Name: Albert Gonzalez
Country of Origin: USA
Current Status: Inactive, currently in prison until 2025
Agenda: $$$

Best Known For:
Starting shadowcrew.com, a website that gained up to 4,000 followers where stolen or fake passports, driver’s licenses, bank account information, debit and credit cards, etc. were bough and sold.
He hacked TJX Companies and Heartland Payment Systems to steal upwards of 45 million debit and credit card numbers. Gonzalez was arrested in 2008 for this crime.

Alias: The Condor, The Darkside Hacker
Name: Kevin Mitnick
Country of Origin: USA
Current Status: Security consultant and author of two books
Agenda: Social engineering

Best Known For:
Being “the most wanted computer criminal.”

Mitnick started his illustrious career by bypassing the punch card system on the city bus line in Los Angeles. Soon he was hacking Motorola, IBM, the Pentagon, and others.
In 1995, a judge placed him in solitary confinement, fearing Mitnick’s skills were so diverse he could start a nuclear war by whistling codes into a payphone.

Alias: c0mrade
Name: Jonathan James
Country of Origin: USA
Current Status: Committed suicide in 2008
Agenda: Unknown

Best Known For:
Being the first juvenile to be tried and sentenced for hacking in America.

At 15, James began hacking into the Miami-Dade School System, Bell South, the Department of Defense, and NASA. He also intercepted source code for the International Space Staion, causing NASA to shut down its computers for 3 weeks to fix the breach.

Alias: Unknown
Name: Vladimir Levin
Country of Origin: Russia
Current Status: Whereabouts unkown
Agenda: $$$

Best Known For:
Without using the internet, but instead, a telecommunications system, he was able to gain access to millions of dollards, which he siphoned off and split between his 2 partners. After serving 3 years in prison, he was ordered to pay back only part of the money because that was all that could be recovered.

Alias: Solo
Name: Gary McKinnon
Country of Origin: England
Current Status: Currently lives in England
Agenda: Looking for evidence of UFO’s

Best Known For:
Hacking into 100 American military and NASA servers from his girlfriend’s aunt’s house. He deleted sensitive software, files, and data.
Later he shut down 2,000 comptuers in the US Army’s Military District of Washington network in just 24 hours, making it the largest military computer hack of all time, rendering the US military network inoperable for days.

Alias: Syrian Electronic Army (group)
Name: Unknown
Country of Origin: Syria
Current Status: Active
Agenda: Support Syrian President Bashar al-Assad

Best Known For:
Hacking US President Barack Obama’s and the Associated Press’ Twitter feeds are just two of the high-profile altercations they’ve been involved in. The Syrian Electronic Army has also attacked political opposition groups, western news organizations, human rights groups, government websites, and US defense contractors.

Alias: Anonymous (group)
Name: Unknown
Country of Origin: Multiple
Current Status: Active
Agenda: Social causes

Best Known For:

Being a group of individual members (known as Anons) from around the globe who unite for social causes.

Anonymous has attacked government, religious, and corporate websites.  Among their targets are the Vatican, the FBI, the CIA, Paypal, Sony, MasterCard, and Visa , as well as the Chinese, Israeli, Tunisian, and Ugandan governments.

Make sure your data is protected offsite with Mozy Online Backup.

Benefits of SaaS

Most business owners face the ongoing challenge of reducing costs yet at the same time driving increases in revenue. One way for a business to reduce costs is to invest in SaaS applications. Not familiar with SaaS? Gartner defines software as a service (SaaS) “As software that is owned, delivered and managed remotely by one or more providers. The provider delivers software based on one set of common code and data definitions that is consumed in a one-to-many model by all contracted customers at anytime on a pay-for-use basis or as a subscription based on use metrics.”

You might be asking yourself, What are a few examples of SaaS applications? SaaS applications include but are not limited to, Google, Twitter, Salesforce, and Mozy cloud backup. Because SaaS applications have significant benefits, they are rapidly penetrating the IT market. Benefits include low cost, pay-as-you-go subscription model, and little to no maintenance for the business owner.

As already mentioned, cost savings is always front of mind for a business owner. SaaS applications can save businesses money on multiple fronts. The biggest cost savings come in the form of not needing to purchase any on-premises hardware. The SaaS provider supplies the appropriate software and resources to get the customer up and running quickly. Using Mozy as an example, the customer purchases the Mozy service and then downloads the Mozy backup software via a silent install. In a relatively short time, the customer can be securely backing up important files.

The pay-as-you-go business model is simple yet efficient. Pay as you go gives you the benefit of accurate budgeting practices as well as the ability to forecast accordingly on costs as you scale your business. Pay as you go also gives you the flexibility of not being tied down by lengthy contracts that can hinder your business operations.

An additional benefit of being a SaaS customer is that the provider is responsible for making sure systems are up to date and that security is handled effectively. This is a huge upside for the customer because the IT department can utilize its time and resources on business-critical priorities. Security is something that SaaS providers do not take lightly. For example, Mozy data centers are world class, embracing the highest of security measures, including 24x7x365 onsite monitoring and security, temperature controls, backup power supplies, fire suppression systems, and biometric scanners.

The benefits of SaaS go far beyond what we’ve discussed in this post. SaaS applications provide numerous benefits across many different industries making it one of the fastest growing industries. In October of 2014, EMC further showed its commitment to the SaaS industry by acquiring Spanning, backup for born-in-cloud applications such as Office 365, Google Apps, and Salesforce. If you’re not already taking advantage of SaaS applications, now is the time to be asking yourself, “What can SaaS do for me?”

Why Should You Be HIPAA Compliant?

HIPAA, otherwise known as the Health Insurance Portability and Accountability Act, sets certain standards for how you handle and safeguard patient data. If you are in the healthcare business, you are required by law to be in compliance. But what does that mean exactly and why is it important? Let’s examine compliance a little closer so you can understand why it is a must for your business.

What It Means to Be HIPAA Compliant

There are many elements that make up the security standards set forth by HIPAA. In order to be compliant, you must meet all of them and continue to evaluate your systems as you move forward.

Safeguards

There are two main types of safeguards that you have to put in place: physical safeguards and technical safeguards.

Physical safeguards cover anything physical, including limited access to the facility and strict controls on who gets access. These safeguards also extend to any company you are working with that has access to your facility and the electronic storage media you use as well.

Technical safeguards cover who, what, and how people access and use the health data stored on your servers. This includes various aspects of security such as unique user IDs, emergency access policies, automatic log off policies, and encryption and decryption methods and usage.

Network and Transmission Security

One of the latest safeguards put in place by HIPAA is network and transmission security. These regulations cover how you transmit data and govern everything associated with that data, including email, file transmissions, Internet, and more. These policies not only dictate how you handle transmissions from one network to another, but even how data is handled on private networks as well.

Technical Policies

These policies include how you handle data and media in your organization. Set procedures and plans must be put in place for things such as disaster recovery and offsite backups, and even include how IT will handle any media failures to ensure the integrity of patient data and the policies you will use to quickly retrieve that data if needed.

Rule Enforcement

In addition to your security policies, you must put in place procedures to follow to enforce the new rules put in place and include the penalties that can be incurred if employees do not adhere to the standards and procedures to the letter. You must also continue to enforce these rules as you move forward.

Breach Notification

HIPAA extends far beyond what you would consider traditional security. In order to be HIPAA compliant, you will need to put in place set policies and procedures to follow if there is a data breach. These policies include how you notify any affected parties.

So Why Try to Be Compliant?

Why bother agreeing to these complicated regulations just to reach compliance? The quick answer is that compliance is the law! If you are dealing with anything healthcare related, including patient records, you must be compliant in order to conduct business. Second, compliance can be a huge selling point for your business, even you don’t deal with healthcare data today. Security has become an increasing concern among both businesses and individuals, and if you meet the government standards for security, you will be able to advertise that to your customers.

Conclusion

HIPAA compliance is complicated yet must be followed and adhered to by any business or individual that handles healthcare data. The more familiar you become with these regulations, the less likely you are to fall out of compliance. As complicated as HIPAA is, there are benefits. Not only will your business be more secure,  it will meet important government standards that safeguard sensitive data. That’s peace of mind to your security-minded customers.

The Nuances of Cloud Computing

The cloud has already changed the way data is stored, and while cloud storage is the most common feature of cloud computing, it is by no means the only, or the most innovative aspect of this digital resource. Here’s a look at cloud computing and what it can do.

Storage and Computation
The cloud does a lot more than you might think. For instance, cloud computing is used for gaming, especially by Microsoft in regards to the Xbox One console. While the cloud is great for data storage, it can also be used for computing tasks via the Internet. The Xbox One may boast some pearly specs, but what makes it truly powerful is that it can outsource some of the computations to the cloud which in turn allows the console to deliver better graphics, a higher frame rate, and increased bandwidth.

Another benefit of the cloud is that it’s cost effective. If you use it primarily for storage, the amount of storage you get for the cost is the best deal on the market. If you were to buy external hardware for data storage, for instance, it would be a far larger investment.

The flexibility the cloud provides is its biggest benefit. Access extra computing power or any data anywhere you are. Whether your work requires travel, or you find yourself most productive out of the office, the cloud works for you.

Storage Encryption
When data is stored in the cloud it is encrypted at the point of travel and while at rest within the cloud’s physical data center. When the data arrives at its destination an integrity check is applied that compares the data sent to the data received. This weeds out any anomalies or potential tampering that may have occurred in transit. However, the true security is the cyber perimeter, hosts, and applications. While in-transit data is a concern, data centers are big targets for potential cyber threats. Sophisticated data center operations help ensure that your data is secure regardless of the type of threat its exposed to.

The Cloud and Businesses
The cloud has changed businesses forever. Boiled down, the cloud is a cost-saving technology. It is an easy way for businesses to share information, projects, and resources with employees, clients, and customers.

Not only has the cloud made the cost of operations lower, it has also made it easier to start a business. This has led to a influx of startups and entrepreneurship around the world. Small companies can share collective infrastructure costs in the form of  subscription-based cloud services, such as Mozy by EMC. Small businesses are no longer tasked with a grand initial investment in terms of computing infrastructure, which promotes creativity in terms of new startups.

Mobile workforces have become common. A central office is no longer needed for businesses, especially small ones, which cuts costs even further because the cloud can be accessed by employees anywhere. Quite simply, cloud computing has changed where and how people work in profound ways.

What do you want in 2016?

It’s 2016. That’s right, another new year is here. If you’re like most people, you probably feel obligated to come up with a resolution or two. You can do that by quickly analyzing the past year, determining what you did well, admitting what you didn’t do well, and then deciding what you would like to accomplish this year.

At this point, you probably should be asking yourself two questions:

  1. Do I want to change?
  2. How do I want to change?

Let’s start with the first question: Do I want to change? If the answer is yes, then move on to the second question, How do I want to change? If the answer is no, then do nothing. Just keep on doing what you’re doing. Face life as it comes at you. Nothing wrong with that.

Answering the second question requires some courage because if you’re being honest about where you are in life, you’re going to have to admit that you’re doing some things well and other things not so well. Or maybe you’re not doing them at all.

You probably already know what you’re doing well. Usually, those are the things you do with confidence and with endless energy and lots of enthusiasm. On the other hand, the things you aren’t doing so well aren’t always so apparent. This is where a good friend comes in handy. If you want to know what you aren’t doing so well, just ask a friend. But be prepared because you might not like the answer. And your good friend (at least for now) might even take things to the next level by telling you what you’re not doing at all but should be doing.

If after asking your friend what you need to work on convinces you that he or she is right, then take some quiet time to reflect on how you can make improvements. In some cases all it might take is a minor adjustment or two. Sometimes just being aware of what you’re not doing well or what you could be doing is motivation enough to get you to do it.

Answering the question “How do I want to change?” requires courage because you have to do more than just face life as it comes at you. You’re not just reacting to life. Instead, acknowledging that you want to or need to change requires action. Action is a verb. You’re deciding what’s important to you and you’re going to do something about it—now. In simple terms, you’re deciding that you want to get from point A to point B. So you come up with a plan. The outcome is important enough to you that you’re committed to that plan regardless of the challenges or the unexpected. You’re going to succeed! You’re going to make 2016 a great year!

From all of us at Mozy, best wishes to you in 2016. Your future is as bright as your commitment to make the changes you decide you want to make.

When Old Tech Becomes New Tech

Every few years we are forced to upgrade the devices that are so much a part of our everyday lives. In fact, we explored the limited lifespan of technology in a recent blog post. For example, the resolution on your new camera soon becomes grainy when compared to what’s available just months after you’ve made your purchase. Smartphone operating system upgrades soon make it impossible to run the apps that you so love. That 42” TV just doesn’t show your football game like the new 80” 4K Ultra HD that stares you down every time you hit the electronics section of your favorite store.

The rapid advance in technology is causing a glut in tech devices such as computers, mobile devices, camcorders, game systems, computer hardware, and video players. In 2014 the world produced 41.8 million metric tons of e-waste. To put that in perspective, that amount of garbage would fill 1.15 million 18-wheel trucks. If you lined up those trucks they would stretch from New York to Tokyo and back again! The EPA estimates that only 15-20% of e-waste is recycled and the rest goes to the landfill. Once the materials in the computers start to break down or are incinerated, they release a variety of toxins that are harmful to the environment as well as to humans. Unfortunately, a lot of that e-waste could have been recycled, up-cycled, or useful to someone else.

I found out that I am part of the 68% of consumers who are stockpiling old devices for no reason. For starters, I have an old iMac G5, a ‘90’s Compaq computer, and a handful of phones and mp3 players. You can probably relate. So it’s time we start doing something about the problem! It’s time we stop dumping them and adding to the fastest-growing source of waste; instead, we can save time, space, and money by properly “disposing” of out-of-date devices.

There are many local organizations that would love your old tech; for example, schools and low-income members of the community. And your donations are tax deductible. If you don’t want to spend the time to find a taker, there are organizations that will pick up your items, refurbish them, and donate them to someone in need. human-I-T is one organization in particular and is a non-profit that transforms unwanted or inoperative technology and makes it operational again for those in need. Consumers as well as companies like LinkedIn, Google, and Cars.com have all reduced e-waste and benefited the community by donating technology to human-I-T.

If you are worried about the data on the device, organizations that refurbish outdated technology follow strict guidelines on removing data from devices so that it can no longer be accessed. This process follows guidelines specified by such laws as Health Insurance Portability and Accountability Act (HIPAA) and Federal Information Security Management Act (FISMA).

Your old tech can find new life with low-income families, veterans, those with disabilities, and schools and organizations. Consider that in 2014 human-I-T was able to divert more than 15 tons of e-waste from landfills. But even more importantly, what was once considered waste was turned into tools to help kids to stay current in their studies and the unemployed to find jobs.

Source;
https://www.causesinternational.com/ewaste/e-waste-facts

The True Cost of Poor Cybersecurity

It might be the oldest attitude in the books: “It won’t happen to me.” Or, “I’ll take care of it later.” But there is a reality that can be costly to businesses, even to the point of taking a business offline or out of commission for good. We’re talking about cyberattacks. They can happen to anyone, anytime. The cost? —Six figures? Seven figures? Ten figures? Depending on the size of the business, any one of these amounts is possible. Take a look at our infographic to explore the true cost of poor cybersecurity.


THE TRUE COST OF POOR CYBERSECURITY: The 5 Worst Data Breaches and Most Costly Viruses
Everyone thinks it always happens to someone else and they are safe from a cyberattack. The companies and individuals on our countdown certainly thought that. Cyberattacks can happen to anyone at anytime.   Whether it is hackers or self-replicating viruses, poor cybersecurity can end up costing you a lot.

5 Worst Data Breaches
#1 American Business Hack
Year: 2005–2012
Records Lost: 160 million
A hacking ring from Russia and Ukraine targeted banks, retail chain stores and payment processors, stealing more than 160 million credit and debit card numbers and more than 800,000 bank account numbers.
#2 eBay
Year: 2014
Records Lost: 145 million
No credit card information was compromised; however, hackers stole customer names, addresses, date of birth, and other personal information. Password information was also compromised. The online auction house simply asked customers to change their passwords immediately.
#3 Heartland Payment Systems
Year: 2006–2008
Records Lost: 130 million
Heartland, one of the world’s largest payment processing companies, was hacked using malware, resulting in the loss of credit and debit card numbers. The mastermind behind the crime was given a 20-year jail sentence, the longest handed down for a computer crime. Heartland ended up paying credit card companies $100 million in claims settlement related to the breach.
#4 TJX
Year: 2003
Records Lost: 94 million
The parent company to stores like T. J. Maxx and Marshalls has said hackers took credit and debit card numbers, and in some instances entire customer identities were stolen, including driver license numbers. The breach ended up costing TJX $256 million and was masterminded by the same person who was in charge of the #3 Heartland hack on the countdown.
#5 Anthem
Year: 2015
Records Lost: 80 million
Names, Social Security numbers, and other sensitive information ideal for identity theft were taken from the second largest health insurance company in America. The hack was said to have originated in China.
5 Most Costly Viruses
#1 MYDOOM
Year: 2004
PCs Infected: 2 Million
Damages: $38,000,000,000
MyDoom was a worm spread through e-mail. 1 in 4 e-mails carried the virus at one time. Mydom was a line in the program’s code (mydomain) and thus, after adding an “o”, it was named.
#2 SOBIG.F
Year: 2003
PCs Infected: 2 Million
Damages: $37,100,000,000
Self-replicating worm spread through e-mail.
#3 ILOVEYOU
Year: 2000
PCs Infected: 500,000 (That’s about 10% of the world’s computers at the time)
Malicious program hidden in an email attachment. ILOVEYOU was the first virus that attached itself to an e-mail.
#4 CONFICKER
Year: 2007
PCs Infected: 12 Million
Damages: $9,100,000,000
Confliker was a worm that scanned computers for weaknesses, logged keystrokes and downloaded code from hacker websites. This virus is still active and as of August 2015, is still infecting about 1 million computers worldwide.
#5 CODE RED
Year: 2001
PCs Infected: 1 Million
Damages: $2,600,000,000
Code Red was a worm that exploited an OS vulnerability, actively looking for other machines to attack. It took down and defaced websites, most notably whitehouse.gov. It was nicknamed Code Red because the pair who discovered the virus were drinking Mountain Dew Code Red at the time of discovery.
35% of businesses have lost data due to flawed IT security. Don’t be caught unprepared. Let Mozy help you manage your cloud security needs.
Visit http://mozy.com/product/features/military-grade-security to learn more about how Mozy can keep your data safe and secure.
Source:
http://www.kaspersky.com/about/news/virus/2013/35_of_businesses_have_lost_data_due_to_flawed_IT_security
https://www.washingtonpost.com/news/the-switch/wp/2015/02/27/security-firm-finds-link-between-china-and-anthem-hack/
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches
http://www.huffingtonpost.com/entry/biggest-worst-data-breaches-hacks_55d4b5a5e4b07addcb44fd9e
http://www.tomsguide.com/us/biggest-data-breaches,news-19083.html
http://www.cio.com/article/2399262/data-breach/the-15-worst-data-security-breaches-of-the-21st-century.html?page=2
http://computer.howstuffworks.com/worst-computer-viruses.htm#page=4
http://uk.norton.com/top-5-viruses/promo
http://www.hongkiat.com/blog/famous-malicious-computer-viruses/
http://www.investopedia.com/financial-edge/0512/10-of-the-most-costly-computer-viruses-of-all-time.aspx
http://www.computerworld.com/article/2956312/malware-vulnerabilities/remember-conficker-its-still-around.html

We want your feedback! Really! (And you might win a prize)

Every now and then we all need help with the software. So what do you do? You contact support! As a Mozy customer, we hope that whenever you have a question about the Mozy service that you don’t hesitate to get in touch with us. It’s our job to help you resolve any issue with the Mozy backup software.

Because we want to do our job to the best of our abilities and because we want your experience with Mozy Support to be a pleasant one, we’re inviting you to let us know of your recent experiences with Mozy Support. What feedback do you have from a recent Mozy Support Portal experience? For example:

•  How did everything go?
•  Are there areas where we can improve?
•  If you could change the way we handled your case, what would that be?

By providing us with constructive feedback on your support experience, not only will you be helping us make improvements to the Portal, you will be helping other Mozy customers who reach out to us in the future with a similar issue. And you just might win a fabulous prize. Wait! Did someone say prize? Yes, we did!

How can you win a prize? Simply send us your ideas for a chance to win. It’s that easy. Do you want to learn more? Are you ready to submit your idea? Maybe you just want us to cut to the chase and tell you what the prizes are? For answers to all of these questions and more, click here.