Guest Post – Cyber-bullying: A Rising Problem in the Internet Space

The internet comes with plenty of possibilities. As robust as the opportunities are, so are some of the negatives that accompany it. One of such downsides is cyber-bullying. A lot of internet users have suffered several forms of cyber-bullying, and the act has left many with scars that may never heal. Similarly, several others have injured themselves physically, being unable to bear the ...

Continue Reading →
0

March 31 is World Backup Day

Tuesday, March 31 is World Backup Day.  Wednesday April 1st is “I don’t backup day.”  It is also April Fool’s Day.  Is there a connection?

In the era of crypto-ransomware attacks, backup is considered one of the cornerstones of a good cybersecurity program.  Having a automatic backup system, and full set of recent and tested backups is critical for businesses of any size.  Current ransomware exploits often will encrypt network attached backup solutions too.  Would your current ...

Continue Reading →
0

Sunday Funnies – Ghost Code

I run into this situation all the time when pen-testing.

Me: “I found this system that is running Windows XP, you need to decommission this one.”

Client: “We can’t, that system is running a custom Access application that was written by a former employee.  He left the company 10 years ago and nobody knows to to update his code.”

Later we discover the system has been hijacked for years and is hosting stolen identity documents, and spamming the customers of a French ISP.

Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Will working and schooling from home break the Internet?

I have been getting this question a lot lately.  Quick answer, it is unlikely, so no it won’t break the Internet.  But is is changing usage from downtown areas to suburbs.  See the map.  From Tech Republic.


Remote working ...

Continue Reading →
0

Reducing Risk When Deploying IoT Devices in Business

The Internet of Things (IoT) has given us a plethora of exciting and helpful computer driven devices.  But the state of IoT security remains a dumpster fire.  As these devices appear in the workplace, businesses are often failing to consider the impact these poorly secured devices have on their carefully crafted cybersecurity programs.  Every one of these devices represents a new ...

Continue Reading →
0
Page 1 of 180 12345...»