What Should You Do If Your Info Is Breached?

US-CERTUS-CERT sent out an announcement in September about a new video from the FTC for people whose personal information may have been breached in a cyber incident.  There are tips on reporting, and how to recover with tools such as a credit freeze or fraud alert.  There are many links on both the CERT and the FTC websites to resources. ...

Continue Reading →
0

The Circle

the-circleI recently read Dave Eggers book The Circle at the recommendation of a friend in the cybersecurity profession.  While I don’t do book reviews in this blog very often, I thought I would throw in my two cents about this book.

I was recommended this book during a cybersecurity training class. I do want to say that this book looks unblinkingly at some ...

Continue Reading →
0

Cyber War Interview on Web Radio

business-game-changers-sarah-westallWe were interviewed again by Sarah Westall on her web radio show Business Game Changers.  Our discussion wove together different threads I have been following about cyber warfare and our lack of national preparedness.  Since reading Ted Koppel’s book Lights Out and watching the documentary Zero Days, this has become a bigger issue for me, and maybe it should be for all ...

Continue Reading →
0

Zero Days – Documentary About Cyber War

zero-daysWe have written about Stuxnet a couple of times.  (Here and here)  My fascination with this incredible piece of malware writing is that it represents the first documented case of cyber war between nation-states.  As we now know, Iran, specifically the nuclear facility at Natanz, was attacked by the United States, and our ally Israel.  I recently watched a documentary ...

Continue Reading →
0

NIST Recommends New Password Rules

NISTThe National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well.  Still in draft from, the standards can be found on the document Special Publication 800-63-3: Digital Authentication Guidelines.   Here are some of the recommended changes, so far.  We approve, and in many cases have been ...

Continue Reading →
0

US-CERT Advises Election Officials To Secure Voter Data

US-CERTAnother out of cycle post, this one directed to anyone who is running balloting operations for the upcoming elections.  I make jokes all the time about our next president being elected by the Russian Cyber Army,  the Chinese Peoples Liberation Army Unit 61398, the ISIS Cyber Caliphate, or the Syrian Electronic Army.  But this is a ...

Continue Reading →
0

FBI Asks Ransomware Victims to Report Infections

ic3The rare Tuesday post.  I got an announcement from the FBI on Friday that I thought was important enough to share that I am squeezing into to my regular publishing schedule on what is typically an off-day. Anyway, now is your chance to stick it to the criminals who have been distributing Locky, CryptoWall, CryptoLocker and other ransomware exploits.  If you or your business has been victimized by ...

Continue Reading →
0

20 Questions For Preparing An IT Risk Assessment

risk-assessment-managementMany small businesses are being dragged into the arena of IT risk assessment by larger client companies, suppliers, or regulators.  Common scenarios include credit card (PCI) or HIPAA compliance.  Since the Target breach, smaller vendors and supplier companies who have a network connection into the IT operations of a larger company are being required to undergo the same sort of vulnerability and risk assessment procedures ...

Continue Reading →
0

Using Your Phone For Video Surveillance

smartphone-videoI discovered a while ago that my LG smart phone can be used fairly easily to make a surreptitious video of a meeting simply by turning on the video camera and slipping the phone into a shirt pocket.  The camera lens clears the edge of the pocket nicely, and there is no indication, at least on my phone, the the camera is rolling.  This is a great way to keep a record that ...

Continue Reading →
0
Page 8 of 10 «...678910