What You Want In Cybersecurity Awareness Training

employee_training_436x270Research shows that over 90% of network breaches happen when an employee falls prey to a phishing email, clicking on the offered link or opening a file attachment, becoming infected with a remote access Trojan, and creating an entry point for the attacker.  If only we could get people to stop falling for phishing emails!

This is really not such a hard thing to do.  Most ...

Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you will ...
Continue Reading →
0

Learning Linux

linux-logoAlthough my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part.  Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994.  I do have an iMac in my current computer collection.  But lately I have been playing around more and more in the Linux platform, both Ubuntu and, ...

Continue Reading →
0

Cybersecurity Jobs In Demand

CEH-logoIf you are in high school (or junior high) or college, attracted to technology, and looking for a career with a future, then you should give serious consideration to the field of Cybersecurity.  A recent press release from Cybrary reveals the results of  its Cyber Security Job Trends Survey for 2016.  Cybrary surveyed 435 senior level technology professionals, and the results indicated a pressing need for more skilled cybersecurity ...

Continue Reading →
0

Cybersecurity Awareness Training

employee_trainingLast week we took an in depth look at social engineering, and looked a phone and email examples in depth.

Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I have been delivering public cybersecurity courses for over a decade, and I know from the responses that ...

Continue Reading →
0

What Is Social Engineering?

social-engineeringThis should really be called “anti-social” engineering.  A good definition is “social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.”

My article on Wednesday will give an example of phone based social engineering – the fake tech support call. ...

Continue Reading →
0

Business Cybersecurity Resolutions

newyear2016As we approach the new year it is traditional to make our New Year’s Resolutions.  Unfortunately, most resolutions are made but not kept, so I am a little reluctant to offer these ideas for improving your cybersecurity in the coming year.  But if you have not climbed on the cybersecurity bandwagon yet, you are definitely overdue. Pick a few of these ideas to implement in your business.

 

Here they are:

  • Stay informed about the ...
Continue Reading →
0
Page 4 of 5 12345