Configuration Management: How Do You Manage the Lifecycle?
Configuration management is the managed maintenance of known configurations of EVERYTHING (code, systems, appliances, work flows, facilities, HVAC, etc.). Keeping track of, confirming, testing, backing...
View ArticleAndroid Malware Much Better At Targeting Vulnerable Phones
Computer criminals are not just interested in targeting desktops and laptop computers. Today more and more malware is being designed for tablets and smart phones. One case in point is the new strains...
View ArticleAttacks Focused on Smartphones Continue to Attract Hackers
While computers and laptops are still a primary focus for hackers, there’s always a desire to reuse old attacks and repackage previously successful hacking techniques. Several examples of this include...
View ArticleCan Thinking like a Hacker Help You be More Secure?
Have you ever wondered if thinking like a hacker can help you be more secure? I’d say, yes! Knowing and understanding their techniques can help you prevent common attacks and exploits. Ethical...
View ArticleOctober is National Cyber Security Awareness Month: How Secure Are You?
October is National Cybersecurity Awareness Month. It’s the perfect time to stop and reevaluate how prepared your personal and company information is for a cybersecurity attack. Does your organization...
View ArticleStopping Hackers Requires Training
Identifying areas of security within a network requires a 24/7 strategy to keep botnets and cyber criminals out of your network. Ultimately, cyber attacks can bring businesses to a grinding halt,...
View Article9 Cyber Security Threats to Watch Out for in 2013
Malware has been around for a while and is something IT security personnel already know to watch out for. But this software that is used by attackers to disturb operations, gather information, or gain...
View ArticleWhat are Zero Day Exploits?
For several years many articles about computer, network, or Internet compromise mention the phrase “zero day exploit” or “zero day attack,” but rarely do these articles define what this is. A zero day...
View ArticleHow Do Hackers Uncover New Vulnerabilities and Weaknesses?
A common question is, “How does a hacking programmer learn about a flaw or vulnerability in the first place?” There are many ways new weaknesses or vulnerabilities are uncovered, but the three most...
View ArticleFive Security Threats to Address in 2013
Now is a good time to look forward to what we expect the New Year to bring. With this in mind, what threats will security professionals need to address this year? Current trends indicate the following...
View ArticleDefending Against an IT Security Threat of Olympic Proportions
If you think defending your company’s network from security attacks is a full-time job, imagine having to pull together a team to protect one of the largest, yet temporary, networks of all time. That’s...
View ArticleThe Morris Worm Turns 25
In November 1988, the first large-scale malware called the Morris Worm was unleashed on an Internet still mostly populated by academics and technology hobbyists. This wasn’t the first worm to reach the...
View ArticleEmily, Ernie, and the Fleecing of a Company
This is the first post in a series examining how information is lost or stolen and how business owners and/or their employees may be the greatest risk to the business. If you are a business owner or...
View ArticleCrytpoLocker: A Serious Malware Threat
In early October 2013, a new type of malicious code emerged. Its name is CryptoLocker. This malware is similar in nature to the ransomware attacks seen over the last few years where a victim’s hard...
View ArticleNew Year, Simple Advice: Lower Cyber Risk and Reduce Liability
The start of a new year is a good time to reiterate cybersecurity best practices and what can happen when we get careless. If anyone believes he or she is immune, it won’t happen to them, or the...
View ArticleSocial Media Users Beware: Two Million Accounts Compromised
A recent CNN headline read, “2 million Facebook, Gmail and Twitter passwords stolen in massive hack.” This attack began sometime in October 2013 and was discovered in late November 2013 by Trustwave, a...
View ArticleThe Click That Changed Emily’s Business
As you may recall from Part I of this series, Emily is the sole owner of a small business. She works from a home office and has two employees who also work from their homes. She uses a smartphone, a...
View ArticleSocial Engineering: How Hackers Hack the Human
According to Donn Parker in Fighting Computer Crime, the weakest link in security is the human. In several presentations and in my writing, I’ve often described the Carbon-Based Problem. With due...
View ArticleSecurity Tips through the Lens of an IP Camera
IP cameras are remote access still and/or video cameras that enable remote monitoring of whatever is in the camera’s view. They have become very popular in recent years as an inexpensive security...
View ArticleWho’s the Hacker?
FBI Agent George Wigan: He does fit the profile perfectly. He’s intelligent but an underachiever, alienated from his parents, has few friends—classic case for recruitment by the Soviets. Lyle Watson:...
View Article
More Pages to Explore .....