Interview With Carolyn Heinze – Part Two

Continuing with my interview with Carolyn Heinze:

CH-       What are the key ingredients of a sound security preparedness strategy?

  • BW- They are:
    • Patch
    • Backup
    • Keep anti-malware software updated
    • Watch for and report suspected email exploits
    • Good password policy coupled with two-factor authentication when possible
    • Create an environment of cybersecurity awareness through training and fun employee events.

CH-       When we think of cyber security, the tendency is to consider breaches that come from the outside. What can organizations do to protect themselves from breaches that can potentially come from the ...

Continue Reading →
0

Malwarebytes Tackles Cryptoware

th-paypage-quick-480This is hot off the press.  Yesterday Malwarebytes announced a beta of a new anti-crypto software product designed to stop CryptoWall4, CryptoLocker, Tesla, and CTB-Locker.  You can download the beta here.

According to Malwarebytes:

“Malwarebytes Anti-Ransomware monitors all activity in the computer and identifies actions which are typical of ransomware activity. It keeps track of all activity and, once it has enough ...

Continue Reading →
0

Interview with Carolyn Heinze

I recently had my second interview with freelancer Carolyn Heinze, and the questions were so interesting I decided to replicate the interview in a couple of posts this week.

From: Carolyn Heinze
Subject: Interview Request – tED Magazine

Dear Bob,

I interviewed you a while back for an article on ransomware that appeared in ChannelPro.  I’m working on another article for which I thought you’d make a great source. Here’s the scoop:

I am writing an article on cyber security, and more specifically, ...

Continue Reading →
0

Sunday Funnies: Airline Safety

quantasAnother story from my friends at Miller Bros Auto Repair in Somerset Wisconsin

Qantas is the only major airline that has never had an accident.  Apparently, after every flight, Qantas pilots fill out a form, called a ‘gripe sheet’, which tells mechanics about problems with the aircraft.  The mechanics correct the problems; document their repairs on the form, and then pilots review the gripe sheets before the next flight.

Never let ...

Continue Reading →
0

Do You Need A Virtual Private Network?

encryptionA virtual private network, or VPN, is a type of network computer connection that creates a private encrypted communications channel, commonly called a “tunnel,” when using insecure networks, such as in hotels and coffee shops, or when communicating over the Internet.  Many businesses provide a VPN connection for their mobile and traveling employees.  This means that when out of the office, a worker can open the VPN and be connected to ...

Continue Reading →
0

What Can I Do With Your Email Account?

Email_thumb2There are many online accounts that would be bad to lose control of, such as your Amazon, eBay, PayPal, or bank account.  But by the far the worst account to lose is your email account.  If I can trick you into giving me your email user ID and password, by using a phishing email, or phone pretext call, I will be in.  I can start off by simply observing, as I read your ...

Continue Reading →
0

Can Your Hospital Be Hacked?

RxQuick answer:  Yes it can!  A recent article in Bloomberg goes deeply into this subject, and reveals the experiences of a white hat hacker named Billy Rios.  Billy and many others in the profession had been hired by the Mayo Clinic in Rochester Minnesota in 2013 to try to hack all the medical devices in the hospital that were connected to the network. ...

Continue Reading →
1
Page 200 of 273 «...170180190198199200201202...»