What is The Dark Web?

dark-web-1When I am doing a cybersecurity presentation, someone is bound to ask about the Dark Web.  What is it, exactly, and how does someone get there?  The how part we discussed on Friday.  Linux Tails is a great tool for accessing and browsing the Dark Web, should you be so inclined.  Before we delve into the Dark Web, let’s talk about the different parts of the web.

  • The Clear Web – ...
Continue Reading →
0

October is Cybersecurity Awareness Month

DHSFrom the Department of Homeland Security website:  “October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events ...

Continue Reading →
0

Use Linux Tails for Privacy

Linux-TailsYou don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy.  Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook.  Maybe you would like a little privacy in your online life.

Linux Tails is ...

Continue Reading →
0

Using The Risk Equation To Set Security Priorities

risk-equationUntil recently most cybersecurity efforts focused on prevention, and this created the anti-malware software, firewall and perimeter defense industries.  But the fact of the matter is that cyber-attackers are going fly right past your perimeter defense and get into your network via port 80 or 110, firewall ports that are open on every network for email and web browsing.  our recommendation is to start managing the consequences of the inevitable security breach. ...

Continue Reading →
0

Mobile Security Tips

smartphone-securityAs we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important.  Smartphones, tablets, wearable tech,  and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off.  When these devices are stolen, you lose much more than the hardware.  Every bit of information on the device is up for grabs too, from contact lists, personal information, ...

Continue Reading →
0

Sunday Funnies: Good Luck!

Another funny sign from Pinterest.  This has special meaning to Americans as we approach the upcoming Presidential Elections.  By the way, Gary Johnson, the Libertarian candidate for President would be a better way to squander your vote this year rather than wasting it on either of the major party candidates.  Just saying….you are going to be wasting that vote anyway, how about we try something new?  The Republican party was a minor party right up to the point ...

Continue Reading →
0

NIST Recommends New Password Rules

NISTThe National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well.  Still in draft from, the standards can be found on the document Special Publication 800-63-3: Digital Authentication Guidelines.   Here are some of the recommended changes, so far.  We approve, and in many cases have ...

Continue Reading →
0
Page 190 of 278 «...160170180188189190191192...»