You have to watch to the very end. Share with your Facebook friends.
Continue Reading →APR
You have to watch to the very end. Share with your Facebook friends.
Continue Reading →We heard about a new twist all the Income Tax refund scam that is popular with cyber-criminals this time of year. A March 27th email from the Minnesota Society of CPAs, warns about a scam that is appearing on the east coast, but could spread anywhere in the US.
Continue Reading →“…the email scam claims a tax preparer has been victimized [or breached] and asks users to open a ...
When you work in a cybersecurity organization that serves other business entities, every now and again you see something really unique. This one crossed my desk on March 28th. A client of ours received a letter by postal mail that threatened to shut them down with a distributed denial of service attack. They are probably trying to avoid the Computer Fraud and Abuse Act, but extortion by postal mail is ...
Continue Reading →Users of the Apple iOS 10.3 phone operating system are being offered two-factor authentication (2FA) for their Apple IDs. This offers an additional layer of security for iCloud data, too.
As we have discussed in previous posts, the benefits of 2FA are that your account cannot be breached with only a stolen password. In addition to the password, a one-time passcode is required ...
Continue Reading →Summer in the Twin Cities finds a lot of cybersecurity seminars, events, and cons. If you are a cybersecurity professional living in or near the Minneapolis/St. Paul area, here are several great opportunities to learn new things, stay current, in the field, network with associates, and earn CPE or CEUs for your certification maintenance.
May 16-17, 2017
Pre-conference: May 15, 2017
Minneapolis Convention Center
1301 2nd Ave S.
Minneapolis, MN 55403
For ...
Continue Reading →According to the Department of Homeland Security (DHS), there are seven strategies that will prevent 85% of targeted attacks. To this list I have added a few of my favorites.
Social networks are a tremendous source of personal information leakage. Actually, more like a waterfall. As we learned in the last post, attackers use social networks to perform reconnaissance against their chosen targets. Since few of us are going to delete all our social network accounts and move of the grid, we have to find a way to live ...
Continue Reading →Controlling your professional information can mean managing the information you disclose on professional networking sites such as LinkedIn. It can also mean protecting the client and employee information you have gathered through your employment. It may mean securing your computer network from outside and inside attackers, or your website from compromise. It may mean properly securing online assets ...
Continue Reading →