847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE

Halock Blog

givesback-thumbr

HALOCK Gives Back – 2014 Year in Review »


All year long, HALOCK employees are helping clients secure their information and data assets, and at the same time, these same employees are great stewards of the communities in which they live.  In 2014, they have run, walked, biked and stepped up innumerable stairs for worthy causes. They’ve lost a few golf balls for … Read More »

regen-thumb

In the Wake of REGIN: Accounting for the State Sponsored Threat »


Recently the Symantec Corporation uncovered a highly sophisticated, modular piece of malware that has been infecting computers in a variety of countries as far back as 2008. Backdoor.regin has characteristics beyond those of modern malware and is already generally accepted as a product of nation-state cyber espionage. The implant likely took considerable resources and … Read More »

protect-mobile-thumb

IT Pros: 4 Tips to Help Friends & Family Protect their Mobile Devices this Holiday Season »


As the holidays approach, you’ll probably be seeing many relatives and friends. Many will pull you aside and ask you about the latest security news, myths and rumors. While preparing for a Thanksgiving visit, one relative asked me about a hoax security alert warning that her iPhone’s flashlight was listening to her conversations.
Educated security … Read More »

shellshock-thumb

All Done with Shellshock? Get Ready for the Next One. »

Why read another article on the Shellshock bug when there have been a number of well-written articles and blog posts on it? Because almost all of the articles and blogs are talking about the bug itself, how it can be exploited, and how much of the Internet is open to it. However, what you … Read More »

shutterstock_84748801-188x202

Lessons in Risk Management: What We Should Learn from the FAA Fire »

Too often in information security we focus on the confidentiality of personal information, ignoring the damage that can result from failures in integrity and availability. In fact, this is the main driver of much of our information security spending in the U.S. But the proper function of information and communications can create huge impacts … Read More »

View Older Posts