Cybersecurity Top 10

cybersecurity_436x270As we approach year-end, many small and medium sized business owners and managers are coming to the realization that their best intentions for creating a cybersecurity program in their organization have fallen short.  This was the year, you promised yourself, that we get a handle on computer and network security.

Well it is not too late to get a start, and here is a short ...

Continue Reading →
0

More Notes from the Cyber Security Summit 2016

cyber-security-summit-2016On Wednesday we looked at several of the important takeaways from this year’s Cyber Security Summit.  Here are a few more.

  • Small businesses need to stop using public email services such as Gmail, Yahoo, or Hotmail for their business email.  User credentials for 500,000 Yahoo email accounts have been stolen, and it could happen to the others.  If you have a domain name you are using for a web site, then you should ...
Continue Reading →
0

Notes from the Cyber Security Summit 2016

cyber-security-summit-2016A couple of weeks ago I attended the Minneapolis Cyber Security Summit 2016 at the J.W. Marriot Hotel in Bloomington Minnesota.  There were two days of presentations on cybersecurity issues, and here are a few of the takeaways for small and medium sized business owners.

  • There are 28 million small businesses in the United States.  The Small Business Administration classifies a business with fewer than 500 employees as a small business.
  • Small businesses account ...
Continue Reading →
0

What You Want In Cybersecurity Awareness Training

employee_training_436x270Research shows that over 90% of network breaches happen when an employee falls prey to a phishing email, clicking on the offered link or opening a file attachment, becoming infected with a remote access Trojan, and creating an entry point for the attacker.  If only we could get people to stop falling for phishing emails!

This is really not such a hard thing to do.  Most ...

Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you will ...
Continue Reading →
0

Learning Linux

linux-logoAlthough my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part.  Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994.  I do have an iMac in my current computer collection.  But lately I have been playing around more and more in the Linux platform, both Ubuntu and, ...

Continue Reading →
0

Cybersecurity Jobs In Demand

CEH-logoIf you are in high school (or junior high) or college, attracted to technology, and looking for a career with a future, then you should give serious consideration to the field of Cybersecurity.  A recent press release from Cybrary reveals the results of  its Cyber Security Job Trends Survey for 2016.  Cybrary surveyed 435 senior level technology professionals, and the results indicated a pressing need for more skilled cybersecurity ...

Continue Reading →
0

Cybersecurity Awareness Training

employee_trainingLast week we took an in depth look at social engineering, and looked a phone and email examples in depth.

Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I have been delivering public cybersecurity courses for over a decade, and I know from the responses that ...

Continue Reading →
0
Page 1 of 2 12