From BackgroundCheck.orgContinue Reading →
Is Linux “safer” to use than Windows? Is it immune to malware? You may be under the assumption that Linux is not vulnerable to the same exploits that plague Windows systems. If so, you would be incorrect. Linux has its very own set of vulnerabilities and working exploits, and Linux servers and computers need anti-malware software protection just as much as their Windows counterparts. Today we will look at some suitable ...Continue Reading →
From the About Damn Time Dept.Continue Reading →
Often it seems that security policies are designed with the assumption that average computer users are ID10Ts (idiot users). Related terms such as PEBKAC (Problem Exists Between Keyboard And Chair), PICNIC (Problem In Chair, Not In Computer), IBM error (Idiot Behind Machine error) and other similar phrases illustrate the dark side of our interactions with our users. Sometimes we allow our ...Continue Reading →
There are members of the cybersecurity profession who say that Cybersecurity Awareness Training is a waste of time and money, because the average computer user just doesn’t care or can’t retain technical information. To them, I repeat a quote from Eppie Lederer aka Ann Landers – “If you think education is expensive – try ignorance.” I firmly believe that one of the best returns on investment in the cybersecurity realm is Cybersecurity Awareness Training for your employees.
You and your employees are ...Continue Reading →
You think you are the clever one because you never use the Internet for online banking, online shopping, or managing accounts like your retirement account, gas and electric utilities, telephone, cell phone, and Internet. Open a Facebook account? Never! You think you are safer from account hijacking and identity theft because you never set up any online accounts. If you don’t have it, they can’t hack it – right? Wrong!
If you ...Continue Reading →
From former Senator Ted Stevens announcing that “the Internet is a series of tubes,” to the recent revocation of network neutrality to this current idiotic “bipartisan” idea (Senators Cory Gardner (R-CO) and Chris Coons (D-DE) announced the Cyber Deterrence and Response Act (S.3378) on August 23rd.) our elected officials prove over and over why lawyers in general and legislators specifically suck at tech.
It appears that these two gentlemen attended ...Continue Reading →
We know that the US government is spying on us. Just how deep the surveillance goes is a question that is hard to answer. If you are one of those people who thinks this surveillance is OK because you “have nothing to hide,” I suppose you could skip this article. But here’s my question – why do you get upset when your identity is stolen by a cyber-criminal, but yet you are unmoved when your own government does the same ...Continue Reading →
I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them. My next post is one of those times. My efforts at verifying the source has been an interesting ...Continue Reading →
Your IT manager comes to you with a look on his or her face that is a combination of panic, shock, and depression. “We’ve been breached, and it looks like they got into the customer database, but I’m not sure how long they’ve been on our network, and what else they might have done.” Do you know what you need to do next?
In previous articles we have covered Continue Reading →