Should I Be Encrypted?

penetration_testWith all the personal data that has been stolen over last couple of years making headlines, prime time news stories, and an endless barrage of hacker-themed TV programs (Scorpion, Person of Interest, Mr Robot, etc.), cybersecurity has become a mainstream topic of interest.  Everyone wants to know how to protect themselves and their data from attack.  Encryption is beginning to look ...

Continue Reading →
0

Data and Goliath by Bruce Schneier – A Review

I finished Bruce Schneier’s latest contribution to the realm of corporate and governmental surveillance. This book is a great read if you want to understand just who IS spying on you. Turns out it is not just the NSA, but big corporations are collecting all data they can on customers and potential customers, and this information is sold and exchanged. Then there is the unholy alliance between corporate American and Big Government surveillance.

At the end, he recommended solutions in the ...

Continue Reading →
0

Google My Account Helps Control Your Privacy

As ironic as it may seem, since Google knows more about us than even the NSA, Google has stepped up with a new tool called My Account to help people control their online privacy.  If you have been lamenting the loss of personal privacy in the Internet age, here at last is something you can do about it.  It may not address all your concerns, but here is a start.

You will be able to control Sign-in and Security, Personal ...

Continue Reading →
0

Bogus Computer Support Via Telemarketing

telemarketerRecently I got a late night phone-call from a client, and in the background I could hear his computer telling him that it was infected with malware and that his problem could be solved by calling a certain phone number.  This was being generated by a pop-up “security alert” window that had materialized when he was on the web comparing the merits of a 1.6 gallon flush to a ...

Continue Reading →
0

Have a WordPress Site? Better Secure It!

WordPresslogoWordPress has become an incredibly popular web design platform, and currently has about a 25% share of all web sites on the Internet.  As an open-source software product that is free to download and use, with a great support and documentation through WordPress.org, and a huge, international development community providing an endless array of themes, plug-ins and widgets, it is easy ...

Continue Reading →
0

Linux Needs Security Too

linux-logoIf you are running a Linux server or Linux desktop in your environment, you need to consider the following security strategies.  Linux users suffer in some cases from the popular delusions of invulnerability that Apple users are prone to, and for some of the same reasons.  Such as, most malware only runs on Windows so why should I care?  Or, Linus is such a small target with less than 2% of ...

Continue Reading →
0

IRS Breach – What To Do

irs-logoAs you have already heard, cyber-thieves from Russia have compromised the IRS Get Transcript website and were able to get records of previous years’ tax filings in order to file fraudulent returns and collect refunds.  What was special about this heist is that the IRS servers were not breached directly, but that the attackers were able to use data gathered elsewhere, from lists of identity information bought on the ...

Continue Reading →
0

Cost of Breach Per Record At $217

The new Ponemon Institute 2015 Cost of Data Breach report was released recently.  This report looks at the costs of 2015 large enterprise class data breaches, but there are some salient pieces of information for small business owners to consider when formulating their cyber security risk management plans.

The average cost per record lost in a data breach increased from $201 in 2014 to $217 in 2015.  Different sorts of records had different costs associated to them.  For instance, more detailed ...

Continue Reading →
0
Page 34 of 38 «...1020303233343536...»