Why The Government Can’t Be Trusted with Back Doors

backdoorHow would you feel if, in order to gain access to a known terrorist’s house, the government passed a law that required every lock manufacturer to create a master key that would unlock every locked door anywhere?  What if the police promised that they would only use the key on the one house?  What if they promised to keep the key safe and secure so it could never get into the hands ...

Continue Reading →
0

OpenDNS Umbrella – Web Filtering and Security for SMBs

OpenDNSA great product for quickly and easily adding web site filtering to your organization is OpenDNS Umbrella.  OpenDNS was recently purchased by Cisco Systems.  OpenDNS is another featured security product that is part of the Managed Services program here at CIT.

The way OpenDNS works is that all of your traffic to and from the Internet is run through the proxy server cloud at OpenDNS.  In addition to protecting your organization ...

Continue Reading →
0

Bitdefender Rated Best Business AV

bitdefenderAV-Test rated Bitdefender Endpoint Security 5.3 the best anti-virus software for Windows client business users in its December 2015 test.  I mention this because this is the product that we deploy here at CIT for our managed service customers.  They rated a nearly perfect score.  Here are the particulars:

  • 100% effective against zero-day malware out of 140 samples used
  • 100% detection of 14,658 pervalent malware samples
  • Bitdefender affected performance negliably, adding a ...
Continue Reading →
0

If Only We Could Block Traffic From the Dark Web…

penetration_testTry to imagine how much bad stuff we could keep off our computers and networks if we could figure out a way to filter incoming traffic from the Dark Web.  Well maybe we can.

First, my apology in advance to my non-technical followers, this article may be a bit high level for the average user.

A post in Spiceworks from “Born2Frag”  goes ...

Continue Reading →
0

Cybersecurity Jobs In Demand

CEH-logoIf you are in high school (or junior high) or college, attracted to technology, and looking for a career with a future, then you should give serious consideration to the field of Cybersecurity.  A recent press release from Cybrary reveals the results of  its Cyber Security Job Trends Survey for 2016.  Cybrary surveyed 435 senior level technology professionals, and the results indicated a pressing need for more skilled cybersecurity ...

Continue Reading →
0

Cybersecurity Awareness Training

employee_trainingLast week we took an in depth look at social engineering, and looked a phone and email examples in depth.

Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I have been delivering public cybersecurity courses for over a decade, and I know from the responses that ...

Continue Reading →
0

What Is Social Engineering?

social-engineeringThis should really be called “anti-social” engineering.  A good definition is “social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.”

My article on Wednesday will give an example of phone based social engineering – the fake tech support call. ...

Continue Reading →
0

Perils From The Edge – Home Routers

ubiquitiMonday we looked at issues with the business class routers at Juniper Networks and Cisco Systems.  Today we are going to look at an exploit affecting the Ubiquiti brand of cable modems.

Cable and DSL “modems” are used by most consumers, and many small businesses to connect their home or business network to the Internet.  These “modems” are really routers.

(It has been a personal pet peave of mine that these devices were called modems ...

Continue Reading →
0

Perils From The Edge – Insecure Routers

juniper-networksAt the end of December last year Juniper Networks discovered that some malicious actors had added code to the firmware and software that run their routers, creating a back door that would allow attackers to access the router remotely, assume administrator privileges, and view and decrypt VPN traffic running through the routers.  As the story unfolded, it turns out that Juniper was using a random number generator from NIST, and that the Continue Reading →

0
Page 24 of 32 «...10202223242526...»