This is a “public service announcement” for all of you (unpaid) home IT consultants who (like me) are charged with ensuring our families’ networks and devices are properly secured. Just as with companies who think they are too small to be hacked, there are plenty of residential users who assume (incorrectly) that they are too uninteresting to be infiltrated. So …
AIS Infographic: U.S. Cyber Security Breaches and Impact
The U.S. has long been at the forefront of defense, but the rise of the Internet age creates serious challenges for the security of our digital information. That’s partly why AIS exists — to help protect the digital information of our clients. In a world where digital security breaches are just as intrusive and damaging as physical security breaches, companies …
Homeland Had it Right!
Just in case you were wondering (like me)… Article by Carol Ko in DOTmed. Emphasis in red added by me. Brian Wood, VP Marketing ——– Yes, Cheney’s pacemaker cyber attack fears were credible Former vice president Dick Cheney made headlines this week after admitting in a 60 Minutes interview that he disabled his pacemaker’s Wi-Fi in 2007 to thwart terrorists …
iFair iTrade? iConvenience vs. iSecurity with iCloud
In the spirit of “let’s make things better, together” I re-post the article below by Chester Wisniewski in Naked Security. As indicated in other blog and whitepaper offerings we’ve put forth, it’s important to note that having SOME level of security can, unfortunately, be misinterpreted as having a SUFFICIENT level of security. Think thrice before assuming your information is secure. …
Back to Basics: Fundamentals of CyberSecurity
Simple yet effective commentary. Periodically we all need reminders about the fundamentals of what’s important– about cybersecurity, about business and customer satisfaction, and about life lived to its full potential. And as sophisticated as our modern world may be, it’s often the most basic things that fall into our blind spots — things we take for granted or discount due …
Fat Stacks: $500B Stolen from US Companies — Every Year
Think cyber-espionage is a victimless crime? Think again. And think how quickly the US competitiveness gap (i.e., our advantage) will shrink if the current rate of intellectual property theft continues apace. CyberSecurity: it’s not just for breakfast anymore. Learn it, do it, preach it. Article by Joshua Philipp in Epoch Times. Emphasis in red added by me. Brian Wood, VP …
Stick ‘Em Up! Cloud Security Held to High(er) Standards
Do as I say, not as I do. Or so reluctant IT managers would have cloud providers believe as they are held to higher standards than what those IT managers currently deliver themselves. While the risks associated with outsourcing ANYTHING to another party are indeed real, I submit that they are just as real as doing those things internally — …
Prepare! The End Is Near
Repetition works — and so the cybersecurity warning messages are starting to soak in. Prepare for “when”, not “if” — for ignorance is no longer an excuse. By John Ginovsky in ABA Banking Journal. Emphasis in red added by me. Brian Wood, VP Marketing ———- Bank survey finds many tech companies preparing for cyber attacks Silicon Valley Bank clients prepare …
54% of Cyber Attacks in Energy Sector
Mirror, mirror, on the wall, who’s the juiciest target of them all? Evidently it’s the energy sector, which faced 54% of all incidents investigated by the DHS Cyber Emergency Response Team in an 8-month period between Oct 2012 and May 2013. The article below was published in Canadian Underwriter — one of my very favorite online Canadian insurance and risk …
NIST Updates CyberSecurity Framework
By virtue of our membership in CyberHive (shout-out to Darin Andersen), AIS participated in the NIST cybersecurity workshop that took place in San Diego in mid-July. Through that event and a few other workshops, NIST has developed an updated cybersecurity framework for critical infrastructure as mandated by the February cybersecurity executive order. The article below — by Cynthia Brumfield in …