Small Business Cybersecurity Checklist Part 1–Bare Minimum

Small businesses and organizations are generally lagging behind their enterprise sized counterparts when it comes to cybersecurity.  Over the next three posts we will look at the actions small business owners and managers should undertake to security their digital assets.

A large part of the reason that small businesses are lagging in cyber security is due to the fact that small owner-managed businesses are generally focusing time, energy, and capital resources at the core purpose of their business:  selling more of ...

Continue Reading →
0

Sunday Funnies: Interstellar Rapper “ChugGer”

So the Rosetta spacecraft has successfully mated with Comet 67P/Churyumov-Gerasimenko (aka ChugGer).  Well except for the part where the lander is in a shadow and the solar panels are not getting enough light to charge the battery.  Oopsy!  One of the many interesting new things we are learning is that this particular comet is “singing.”  And they said “in space no one can here you scream.”  I guess not.  Anyway, drift ...

Continue Reading →
0

Lets Go Phishing–5 Steps To Empty Your Bank Account

Cybercriminals have lots of ways to exploit their victims, but the single most effect method to gain initial entry remains the phishing email.  If you want to protect yourself from these sorts of exploits you need to know what they look like and what happens if they trick you into responding.  Let’s take a look at a scenario where the bad guys are trying to get your online banking credentials.

  • Step 1:  Cybercriminals will send out a realistic looking but fake ...
Continue Reading →
0

Cybersecurity: What’s Left – Avoidance, Prevention, Detection and Removal

On the Internet, as in real life, there are basically three ways to stay out of trouble, or at least get out of trouble.  They are avoidance, prevention, and then detection and removal.

  • Avoidance – this is actually the easiest and best solution to cybersecurity.  Learn what trouble looks like, and avoid contact.  If you want to avoid malware intrusions, learn how to recognize clever phishing emails and resist the urge to click on a link or open a file attachment ...
Continue Reading →
0

Researchers Discover 17,000 Macs in a Botnet

Image result for apple logoPeople who use Apple computers operate under the assumption that they are invulnerable to malware attacks.  This information is reinforced by the Geniuses at the Apple Store, or so I have been told by more than one of my Mac-based clients.  But we have been warning for several years now that this is no longer true.  This must be ...

Continue Reading →
0

95% of Cybersecurity Breached Due to Human Error

“A recently released report from computing giant IBM attributes some 95% of IT security breaches to human error and that over 75% of attacks are targeted at just five industries, proving when it comes to security, people are the real problem”

This just proves once again that when it comes to cybersecurity, training and education for your employees is going to provide a bigger return on investment than anything else you can do.  Most attacks start as email or ...

Continue Reading →
0

7 Steps For Securing Your Email Account

EmailIf you  are using Gmail, Yahoo Mail, or any flavor of Microsoft mail (Outlook.com, MSN, Hotmail, etc.) there are additional steps you should take to ensure that your email is not only secure, but that in the event your email account is hijacked and taken over by bad actors on the web, that you can recover it with a minimum of inconvenience.  Here are the steps:

  1. Create a strong ...
Continue Reading →
0

Is My Flashlight App Spying On Me?

There has been a bit of a dust up on the Internet over a video from Fox News between journalist Bret Baier and security consultant Gary Miliefsky, SnoopWall CEO.  In the interview Gary claims that the top ten smartphone flashlight apps are collecting information on the user and sending it to foreign countries such as India, Russia, and China.  He states that this information is probably being used to mount cyber-attacks against American assets.  interestingly enough his ...

Continue Reading →
0

Application Whitelisting–Anti-Malware Solution

The problem with preventing or blocking malware exploits is two-fold.  The first issue, frankly, is that the opponents and the tools they are deploying are just so damn good.  This is distressing, and has changed the defensive game from blocking and tackling (prevention) to one of constant vigilance, early detection, and quick recovery.  Basically, we have conceded the network edge, and are fighting the battle from inside the network perimeter.

Continue Reading →
0
Page 102 of 150 «...708090100101102103104...»