Top Cybersecurity Threats in 2015

penetration_test_436x270The cybersecurity threat surface is constantly changing.  Below are listed the top areas of concern among cybersecurity experts.  Some are new, and some have been around seemingly forever.

New Threats

  • Emerging technologies and the Internet of Things (IoT).  It seems that all of our new toys are Internet enabled in some way, and many of these devices present a new attack surface for cyber-criminals.  The ...
Continue Reading →
0

Please Stop Falling For Tech Support Scams

STOP THE MADNESS!!  It drives me crazy when a client calls me AFTER spending an hour on the phone with some tech support scammer, and then thinks to call me after they have a problem “fixed” that they never had in the first place.

One of my clients recently fell for an interesting variation of the Tech Support Scam.  She did a Google search to find the HP technical support number, but the company she called, while at the top of ...

Continue Reading →
0

FBI Warns About IOT Vulnerabilities

IOTOne of the major trends in technology is the proliferation of smart devices, also known as the Internet of Things (IOT).   The FBI recently released a public service announcement titled “Internet of Things Poses Opportunites For Cyber Crime.”  More and more devices are are coming with software, processors and network capability, and connecting to our home and business ...

Continue Reading →
0

Security Improved in IOS 9

applelogoApple introduced IOS 9 recently and it is full of security improvements that matter.  You should upgrade if you haven’t already.  They include:

  • Passcodes increased from 4 digit to 6 digit PINs, which is 10,000 time stronger.
  • Two-factor authentication (2FA) for supported devices. Not all are, which is too bad.
  • Changes to the Apple Store to key annoying app vendors from bombarding you with crossgrade ads on products ...
Continue Reading →
0

Jeb Bush Defends NSA

jeb-bush-550Back on Sept 18 we criticized presidential candidate Jeb Bush, FBI Director James Comey, and other politicians for complaining that encryption was making it too hard to fight the “evil doers” and suggesting that some sort of “master key” or “backdoor” was needed by law enforcement and intelligence services to do their jobs.  We of course disagreed.

Around the same time that ...

Continue Reading →
0

Password Strategy Part 1

passwordToday we start a three article series on developing good password strategy for you small business.  As it happens, there is a great resource available courtesy of Her Majesty’s Government.  The British signals intelligence department, GCHQ, has published a guide to password policy entitled Password Guidance: Simplifying Your Approach.  This 12 page guide offers password advise in seven sections.  They are:

  • Change all default passwords on devices that you deploy on ...
Continue Reading →
0

AppGuard – Computer Security That Works

AppGuardI am often asked by frustrated clients “Why doesn’t traditional anti-virus and Internet security software products work?”  The unfortunate answer I have to give them is “It’s your fault.”  The more diplomatic answer I really use is that the security software cannot prevent something that is explicitly allowed by the computer user.  And the computer user is easily tricked into opening a file ...

Continue Reading →
0
Page 37 of 44 «...1020303536373839...»