Getting Certified? Here’s How To Pass The Exam

In our last post we focused on preparing for your certification exam.  Today we will address the best techniques for succeeding on exam day. 

  • Schedule Your Exam – Check with your certification authority to see which testing centers they use.  In information technology, this is generally PearsonVue or Prometric.  Go to their website, and create an account.  Then follow the instructions for your certification.  ...
Continue Reading →
0

Sunday Funnies – Enormous Michigan Fungus VS World’s Largest Aspen Tree.

What is the biggest plant in the world?  The fungus that ate the UP?  This is the second largest organism in the world, right behind another gigantic fungus in Oregon that covers 3 square miles.  But wait, there’s a quaking aspen grove in Utah that is one large genetic clone organism weighing 13 million pounds and sharing a single root system.   An interesting pair of articles from the SmithsonianFungus vs Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Holiday Scams and Malware Campaigns

11/19/2018 09:18 PM EST Original release date: November 19, 2018

As the holidays approach, NCCIC reminds users to be aware of seasonal scams and malware campaigns. Users should be cautious of unsolicited emails that contain malicious links or attachments with malware, advertisements infected with malware, and requests for donations from fraudulent charitable organizations, ...

Continue Reading →
0

Failures in Encryption – IronPhone

Netherlands security company Black Box Security was raided by the Dutch Police and shuttered on suspicion of money laundering and operating a criminal enterprise.  Black Box was the inventor of the Iron Phone and the Iron Chat app.  Together, they were supposed to provide an unbreakable encrypted chat service.  This service became a popular favorite among cyber and other criminals.

According ...

Continue Reading →
0

Another Problem with MFA – Slow Adoption

Do the web sites your frequently visit offer two-factor authentication?  Have you enabled 2FA where it is available to you?  Is the particular implementation of 2FA or MFA security really adding any extra protection for you?   Not sure?  Please read on.

Password management company Dashlane recently ranked 34 of the top websites for their implementation of two-factor or multi-factor authentication options for ...

Continue Reading →
0

Google Blazes New Trails in Authentication

Two-factor and multi-factor authentication historically have been based on using two or more of three criteria:  something you know (passwords), something you have (security token) or something you are (biometrics such as fingerprints).  There have been two new additions to MFA criteria: something you do (keyboard cadence or mouse movement), and somewhere you are (geo-location through GPS or public IP address).

Google has been busy heightening the security for it’s account ...

Continue Reading →
0
Page 130 of 273 «...100110120128129130131132...»