More Notes from the Cyber Security Summit 2016

cyber-security-summit-2016On Wednesday we looked at several of the important takeaways from this year’s Cyber Security Summit.  Here are a few more.

  • Small businesses need to stop using public email services such as Gmail, Yahoo, or Hotmail for their business email.  User credentials for 500,000 Yahoo email accounts have been stolen, and it could happen to the others.  If you have a domain name you are using for a web site, then you should ...
Continue Reading →
0

Notes from the Cyber Security Summit 2016

cyber-security-summit-2016A couple of weeks ago I attended the Minneapolis Cyber Security Summit 2016 at the J.W. Marriot Hotel in Bloomington Minnesota.  There were two days of presentations on cybersecurity issues, and here are a few of the takeaways for small and medium sized business owners.

  • There are 28 million small businesses in the United States.  The Small Business Administration classifies a business with fewer than 500 employees as a small business.
  • Small businesses ...
Continue Reading →
0

Cybersecurity and the Elections

election-hackedIn the last several days, we have seen big distributed denial of service (DDoS) attacks against DynDNS, an Internet services company that provides domain name services (DNS) to many companies including Twitter and PayPal.  DNS is how web sites are found on the web, you enter a web address in your browser, and DNS finds the website you are looking for.  When attacked in ...

Continue Reading →
0

NIST Offers Cybersecurity Assessment Tool

NISTNIST has created a self assessment tool for companies and organization who are working through the NIST Cyber Security Framework (NIST-CSF).  This tool is called the Baldridge Cybersecurity Excellence Bulder and is designed to help companies implement the principles of the CSF.

According to NIST, organizations can use the Baldrige Cybersecurity Excellence Builder to:

  • Identify cybersecurity-related activities that are critical to business ...
Continue Reading →
0

What Happens If The Lights Go Out?

lights-outI attended the (ISC)2 Security Congress in September, and one of the featured speakers was well known television journalist Ted Koppel.  He gave a presentation about his new book Lights Out:  A Cyberattack, A Nation Unprepared, Surviving the Aftermath.  You are probably wondering, as I was, what would make Ted Koppel an authority on this particular subject?  The answer is ...

Continue Reading →
2

The Circle

the-circleI recently read Dave Eggers book The Circle at the recommendation of a friend in the cybersecurity profession.  While I don’t do book reviews in this blog very often, I thought I would throw in my two cents about this book.

I was recommended this book during a cybersecurity training class. I do want to say that this book looks unblinkingly at ...

Continue Reading →
0

Cyber War Interview on Web Radio

business-game-changers-sarah-westallWe were interviewed again by Sarah Westall on her web radio show Business Game Changers.  Our discussion wove together different threads I have been following about cyber warfare and our lack of national preparedness.  Since reading Ted Koppel’s book Lights Out and watching the documentary Zero Days, this has become a bigger issue for me, and maybe it should be for ...

Continue Reading →
0

FTC Issues Alert for Rental Car Users

DHSBack on August 31 I received an email from the Department of Homeland Security about a set of FTC recommendations for people using rental cars.  I have experienced this issue myself.  Basically, it is simple and relatively convenient to connect a smartphone to the smart vehicle’s infotainment system in order to enjoy hands free phone calls, stored musical tracks, and the phone’s navigation application.  The problem is that the ...

Continue Reading →
0
Page 82 of 107 «...5060708081828384...»