Why bother battening the hatches and remaining resilient when… THE BAD GUYS ARE COMING TO GET US !?!? Tried-and-trusted risk management approaches are just way too passe when…DANGER LURKS IN EVERY LINK! Article by Warwick Ashford in ComputerWeekly. Emphasis in red added by me. Brian Wood, VP Marketing ——— Fear of cyber attack driving a shift from risk-based security, says …
With LG, “Watching TV” Takes on Whole New Meaning
PRISM schmizm. The NSA’s got nothin’ on LG. Article by Pam Baker in FierceBigData Emphasis in red added by me. Brian Wood, VP Marketing ——— LG caught red-handed spying on viewers via Smart TVs Jason Huntley, U.K. ICT consultant, accidently discovered his LG Smart TV was sending extensive information about his viewing habits to the Korean manufacturer. He gives a …
Seriously? Top 50 Popular Passwords
Call me crass, but what I really want to know is whether “schadenfreude” is a strong password. Wait for it…1…2…3…4…5…6…Yah? Article by Graham Cluley on his website. Emphasis in red added by me. Brian Wood, VP Marketing ——— The top 50 woeful passwords exposed by the Adobe security breach In early October, Adobe revealed that hackers had breached its network …
How to Know If You’ve Been Hacked
Want to stay healthy? Don’t take candy from strangers, and don’t drink from other peoples’ cups, and wash your hands frequently. Want to stay cyber healthy? Don’t click on links from unknown senders, don’t turn off your malware detection software, and scan your system often. Article by Roger A. Grimes in InfoWorld. Emphasis in red added by me. Brian Wood, …
How to Not Be an Idiot
Read and heed. Article by Saroj Datoo in Quartz. Emphasis in red added by me. Brian Wood, VP Marketing ——— The complete guide to not being that idiot who got the company hacked Every week there are headlines about a company getting its email, website, Twitter accounts or something else hacked. The reason? In a word: Employees. Each of your …
The Nut Behind the Wheel
Looking for quick ROI on cyber security? Start with training your people. Great article by Jessica Barker in Econsultancy. Emphasis in red added by me. Brian Wood, VP Marketing ———- Don’t be fooled by the name: cyber security is about people, not technology When you hear the phrase ‘cyber security’, what springs to mind? On the face of it, cyber …
What It’s Like to Be Hacked
Below is a great read about what it’s like to be hacked (by invitation, with full details of how the “bad” guys did it). Article by Adam Penenberg, the editor of PandoDaily — with cool illustrations by Alex Schubert. Emphasis in red added by me. Brian Wood, VP Marketing ———- I challenged hackers to investigate me and what they found …
Buyer (and Gamer) Beware
By now we all know the drill: Zombie “sleeper cells” are programmed to wake up and attack on a designated date — with their hosts none the wiser. Similarly, it turns out that seemingly innocuous (and free) computer games from our friends in North Korea are merely shells for the evil malware that lurks within. Far-fetched? Nah. Fact-checked. Article by …
Let’s Get Naked (Security)
This is a “public service announcement” for all of you (unpaid) home IT consultants who (like me) are charged with ensuring our families’ networks and devices are properly secured. Just as with companies who think they are too small to be hacked, there are plenty of residential users who assume (incorrectly) that they are too uninteresting to be infiltrated. So …
AIS Infographic: U.S. Cyber Security Breaches and Impact
The U.S. has long been at the forefront of defense, but the rise of the Internet age creates serious challenges for the security of our digital information. That’s partly why AIS exists — to help protect the digital information of our clients. In a world where digital security breaches are just as intrusive and damaging as physical security breaches, companies …