Guest Post – Remote Desktop Protocol Users Have Highest Incidence of Ransomware Attacks

As more schools and businesses find themselves going online, Remote Desktop Protocol (RDP) users are more vulnerable than ever to a ransomware attack. Learn more about the latest threat from Drovorub malware, and what organizations can do to protect themselves.  This article is offered as a part of Cybersecurity Awareness Month, and the week two theme, “Securing devices ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Telework Essentials Toolkit

Original release date: September 30, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their ...

Continue Reading →
0

If You Connect It, Protect It

Keeping our connected devices secure has become easier – and harder!  Easier because we have more tools to defend our online assets, and harder because the opposition has grown much larger and become more sophisticated.  And the enemy is not limited to criminals, there are terrorist groups, nation-state sponsored cyber operations teams, hacktivists, and other with malicious intent and nefarious schemes.

When I started writing this blog in October 2006, almost ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Who is Tech Investor John Bernard?

John Bernard, the subject of a story here last week about a self-proclaimed millionaire investor who has bilked countless tech startups, appears to be a pseudonym for John Clifton Davies, a U.K. man who absconded from justice before being convicted on multiple counts of fraud in ...

Continue Reading →
0

How to Get Experience

One of the persistent questions I am asked, as an instructor, is a variation of:   “Every job I apply for wants experience, how do I get experience without a job?”  The flip side of that question comes from IT managers, and sounds like:  “We see too many candidates with computer degrees that lack any hands on computer experience or working knowledge of computers or networking.”

The problem is most college degree ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Securing Industrial Control Systems: A Unified Initiative

Original release date: July 7, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released its five-year industrial control systems (ICS) strategy: Securing Industrial Control Systems: A Unified Initiative. The strategy—developed in collaboration with industry and government partners—lays out CISA’s plan to improve, unify, ...

Continue Reading →
0

Guest Post – How Many Websites Are There?

The Internet is an amazing development. perhaps the greatest invention in all of human history.  It is an unparalleled information repository, an incredible economic engine, a great liberator, and organ of free speech and expression.  It is truly revolutionary.

A wonderful guest post from Siege Media.


It’s estimated that over 1.7 billion websites exist, but this number ...

Continue Reading →
0

Shouldn’t It Be Called Anti-Social Engineering?

Just as there is nothing “social” about social distancing, there is nothing social about social engineering.  We could easily call it anti-social engineering, since this is practiced by cyber-criminals and sociopaths to separate us from our personal information or our money.  A more common term would be scam or con.

These bad actors are masters at playing on our emotions.  When I teach a cybersecurity awareness course, I advise people to ...

Continue Reading →
0
Page 1 of 58 12345...»