March 31 is World Backup Day

Tuesday, March 31 is World Backup Day.  Wednesday April 1st is “I don’t backup day.”  It is also April Fool’s Day.  Is there a connection?

In the era of crypto-ransomware attacks, backup is considered one of the cornerstones of a good cybersecurity program.  Having a automatic backup system, and full set of recent and tested backups is critical for businesses of any size.  Current ransomware exploits often will encrypt network attached backup solutions too.  Would your current ...

Continue Reading →
0

Cybersecurity Basics for Small Businesses

If you are a small business owner or manager, you have a target on your back.   You face a special set of risks from cyber-crime exploits.  Most often, you do not have the financial resources to afford a full time IT support employee.  You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems.  You might not even have a firewall, or ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tomorrow is World Backup Day

March 31 is World Backup Day.  Monday is April Fool’s Day.  Coincidence?  I think not.  I you are one of the hold-outs who is going to get around to it someday, today is your chance.


Google reveals BuggyCow macOS security flaw

Google’s Project Zero researchers have revealed a “high ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Falling Chinese Space Station

Sometime around April 3—give or take about a week—China’s 9.5-ton Tiangong-1 space station will fall out of orbit and enter Earth’s atmosphere. While media reports for the last few months have hyped the “uncontrolled” de-orbit as ...

Continue Reading →
0

Tomorrow is World Backup Day

Which means we all get into our cars and spend the day driving in reverse?  Not quite.  What this means for some of your that today is the day you quit kicking that can down the road and set up a data backup for your systems.  Hardware, software, cloud – pick your poison and set it up.

For those of you who are already using a backup solution, today would be a ...

Continue Reading →
1

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were the ...

Continue Reading →
0

Remote Desktop Protocol Attacks Against Windows Servers

Thanks to Datarecovery.com, for alerting us to this issue.  They have seen a high number RDP (Remote Desktop Protocol) attacks lately. Generally, these attacks are targeting Microsoft Windows-based servers, where port 3389 has been left open.

The attacker scans for open port 3389, and then uses a password dictionary attack to break the server password. Once the password is found, the attacker can exploit the server or sell access to the server ...

Continue Reading →
0

Smartphones Need Security Too

When a smartphone is stolen, it is a disaster.  You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app.  If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks.  If you have live camera feeds ...

Continue Reading →
0

Ransomware is not Dead Yet

Toward the end of last year I made a pair of bold predictions.  The first, that ransomware exploits would start declining, because anti-malware software companies were bringing products online that would prevent the encryption from taking place.  The second, there would be an increase in Business Email Compromise (BEC) exploits, as cyber-criminals turned to new income streams.  I was only half right.

BEC exploits have increased, because the potential returns are so ...

Continue Reading →
0
Page 1 of 2 12