Using The Risk Equation To Set Security Priorities

risk-equationUntil recently most cybersecurity efforts focused on prevention, and this created the anti-malware software, firewall and perimeter defense industries.  But the fact of the matter is that cyber-attackers are going fly right past your perimeter defense and get into your network via port 80 or 110, firewall ports that are open on every network for email and web browsing.  our recommendation is to start managing the consequences of the inevitable security breach.  One ...

Continue Reading →
0

Mobile Security Tips

smartphone-securityAs we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important.  Smartphones, tablets, wearable tech,  and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off.  When these devices are stolen, you lose much more than the hardware.  Every bit of information on the device is up for grabs too, from contact lists, personal information, mobile ...

Continue Reading →
0

Sunday Funnies: Good Luck!

Another funny sign from Pinterest.  This has special meaning to Americans as we approach the upcoming Presidential Elections.  By the way, Gary Johnson, the Libertarian candidate for President would be a better way to squander your vote this year rather than wasting it on either of the major party candidates.  Just saying….you are going to be wasting that vote anyway, how about we try something new?  The Republican party was a minor party right up to the point ...

Continue Reading →
0

NIST Recommends New Password Rules

NISTThe National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well.  Still in draft from, the standards can be found on the document Special Publication 800-63-3: Digital Authentication Guidelines.   Here are some of the recommended changes, so far.  We approve, and in many cases have been ...

Continue Reading →
0

US-CERT Advises Election Officials To Secure Voter Data

US-CERTAnother out of cycle post, this one directed to anyone who is running balloting operations for the upcoming elections.  I make jokes all the time about our next president being elected by the Russian Cyber Army,  the Chinese Peoples Liberation Army Unit 61398, the ISIS Cyber Caliphate, or the Syrian Electronic Army.  But this is a ...

Continue Reading →
0

FBI Asks Ransomware Victims to Report Infections

ic3The rare Tuesday post.  I got an announcement from the FBI on Friday that I thought was important enough to share that I am squeezing into to my regular publishing schedule on what is typically an off-day. Anyway, now is your chance to stick it to the criminals who have been distributing Locky, CryptoWall, CryptoLocker and other ransomware exploits.  If you or your business has been victimized by ...

Continue Reading →
0

What Is Your Data Worth?

penetration_test_436x270When you lose your login credentials to an online account, it can be devastating.  Depending on what was compromised and what was lost, you may have an expensive and time-consuming task on your hands.  So the bad guys took your user ID and password, or some other personal information.  Was it worth it?  There is an active resale market for this information, and some ...

Continue Reading →
0

Using Windows Defender Offline

Windows10We have been recommending Windows Defender as an acceptable anti-malware program.  What we like about it is that it comes baked into the Windows 10 operating system, and gets its malware definitions updates with the other Windows security and feature updates that users are already receiving.   And it is free.  Plus it keeps your system a little less cluttered than adding a third party anti-malware product.

Sure, it is not top of ...

Continue Reading →
0
Page 1 of 89 12345...»