-
Continue Reading →
14
JUN1Share
We recently presented a one-hour Lunch and Learn seminar of cybersecurity on behalf of St Paul SCORE. This event was video recorded and can be found on YouTube, on the WyzGuys Computer channel. Here is the video:
As we have mentioned several times, humans represent the weakest link in cybersecurity. This means we are terrible at creating strong passwords, and we are bad at remembering them, too. So all of our online service providers have password reset systems that usually include a series of “secret” questions that are supposed to be both hard for an attacker to guess, but easy for the account holder to remember. Unfortunately, ...
JUN
Just a quick update to announce that we were a guest again on Sarah Westall’s Talk radio program, Business Game Changers. The link for the June program is below, as well as links to my other appearances in December and September of last year.
June 8, 2015 – Business Game Changers – Cyber Espionage, the Dark Web, and loss of Billions to US Businesses
Dec 8, 2014 – Cybercriminals use Government Espionage Tools to Steal Billions and how the US ...
Continue Reading →JUN
One of the early steps a small business needs to undertake is the creation of a cybersecurity policy. This is not a trivial undertaking, and taking a look at the information below will undoubtedly make this project look daunting to the average small business owner. A good solution would be to find a cybersecurity professional with experience in policy creation ...
JUN
We have been relying on the trusty password for years, but as password cracking technologies improve, even longer and more complex passwords are being solved and sold on rainbow tables. So passwords are for the most part over. Two factor authentication is possibly a solution, but biometrics are becoming a big part of what is next in the field of user authentication. We have already seen fingerprint scanners on some ...
JUN
From Pinterest
-
Continue Reading →
7Share
JUN
US-CERT (The United States Computer Emergency Readiness Team) has released a report listing the top 30 exploited software vulnerabilities. This shows that one of the biggest problems is still that software is not being patched and updated in a timely manner, if at all. And the HP Cyber Risk Report explores this issue further, and offers four strategies ...
JUN
If you are on LinkedIn, as I am, today is a good day to change your password. It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website. While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and
Continue Reading →
JUN
TOR, or The Onion Router is a method of surfing the Internet anonymously. TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret. One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.
There is a ...
Continue Reading →JUN