Interesting DDoS Ransom Threat Arrives By Postal Mail

When you work in a cybersecurity organization that serves other business entities, every now and again you see something really unique.  This one crossed my desk on March 28th.  A client of ours received a letter by postal mail that threatened to shut them down with a distributed denial of service attack.  They are probably trying to avoid the Computer Fraud and Abuse Act, but extortion by postal mail is ...

Continue Reading →
0

Apple Pushing Two-Factor Authentication

Users of the Apple iOS 10.3 phone operating system are being offered two-factor authentication (2FA) for their Apple IDs.  This offers an additional layer of security for iCloud data, too.

As we have discussed in previous posts, the benefits of 2FA are that your account cannot be breached with only a stolen password.  In addition to the password, a one-time passcode is required ...

Continue Reading →
0

Summer Cybersecurity Events in the Twin Cities

Summer in the Twin Cities finds a lot of cybersecurity seminars, events, and cons.  If you are a cybersecurity professional living in or near the Minneapolis/St. Paul area, here are several great opportunities to learn new things, stay current, in the field, network with associates, and earn CPE or CEUs for your certification maintenance.

Secure360 2017

May 16-17, 2017
Pre-conference: May 15, 2017

Minneapolis Convention Center
1301 2nd Ave S.
Minneapolis, MN 55403

For ...

Continue Reading →
0

The Top Cybersecurity Strategies That Prevent Targeted Attacks

According to the Department of Homeland Security (DHS), there are seven strategies that will prevent 85% of targeted attacks.  To this list I have added a few of my favorites.

  • Password Manager Programs – If you are truly going to have dozens or hundreds of unique and long passwords, you will need the help of a password manager program to keep them all straight, and ...
Continue Reading →
0

Securing Your Social Networks

Social networks are a tremendous source of personal information leakage.  Actually, more like a waterfall.  As we learned in the last post, attackers use social networks to perform reconnaissance against their chosen targets.  Since few of us are going to delete all our social network accounts and move of the grid, we have to find a way to live ...

Continue Reading →
0

Protecting Your Professional Reputation

Controlling your professional information can mean managing the information you disclose on professional networking sites such as LinkedIn.  It can also mean protecting the client and employee information you have gathered through your employment.   It may mean securing your computer network from outside and inside attackers, or your website from compromise.  It may mean properly securing online assets ...

Continue Reading →
0
Page 174 of 273 «...150160170172173174175176...»