Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

National Cybersecurity Awareness Month: Cybersecurity at Home

10/02/2018 06:32 AM EDT  Original release date: October 02, 2018

October is National Cybersecurity Awareness Month (NCSAM), an annual campaign to raise awareness about cybersecurity. The National Cyber Security Alliance (NCSA) has published general tips to help you increase your cybersecurity awareness—including whom to contact if you are the victim of cyber crime—and protect your online activities.

NCCIC encourages users and administrators to review NCSA’s guidance for online safety basics and the NCCIC Tip on Avoiding Social Engineering and Phishing Attacks for additional information.

Cybersecurity Threats to Precision Agriculture

10/03/2018 08:04 PM EDT  Original release date: October 03, 2018  (Finally an explanation for crop circles – hijacked tractors! LOL)

DHS has released a report to address cybersecurity threats to new precision agriculture technologies used in crop and livestock production. Precision agriculture employs a variety of embedded and connected technologies to generate data used to enhance agricultural and livestock management. As adoption of precision agriculture technology has increased, vulnerabilities and cyber threat issues have emerged. An attacker could exploit precision agriculture vulnerabilities to access sensitive data, steal resources, and destroy equipment.

NCCIC recommends users and administrators review the DHS report on Threats to Precision Agriculture for more information and apply the recommended mitigations.

FTC Issues Alert on Recent Facebook Breach

10/03/2018 01:30 PM EDT  Original release date: October 03, 2018

The Federal Trade Commission (FTC) has released an alert to provide Facebook users with recommended precautions against identity theft after the recent breach of the Facebook social media platform.

NCCIC encourages users and administrators to review the FTC Alert and the NCCIC Tip on Preventing and Responding to Identity Theft. If you believe you are a victim of identity theft, visit the FTC’s identity theft website to make a report.

Chinese Manufacture and Embed Spy Chips on Tech Gear.

I’ve been predicting this scenario for over a decade.  Nearly all tech gear is manufactured in China, where they have every opportunity to build in hardware chips that provided remote access, surveillance, and control.  When the cyber world war starts and we finally admit that the Chinese have been chipping technology for decades, and now control all the servers and routers on the Internet, it will be too late.  Some things are better done yourself.  We in the west, in our eternal quest for lower costs and higher profits, have set ourselves up to lose the first cyber world war.  We  should all learn Chinese, we will need to know it soon enough.

Tim Berners-Lee Moves Forward With His Big Plan To Fix The Web By Bringing Back Its Original Decentralized Promise

A ray of hope.  The man who gave us the World Wide Web protocol is trying to fix the Internet, and return it to it’s open-source roots.



About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.