IT Security Pros Give Cloud a Bronx Cheer

Brian Wood Blog

According to the study below, it’s shocking that IT security professionals even bother to get out of bed. Well, that may be a bit of hyperbole, but it illustrates the extreme negative / pessimistic / cautious outlook of IT security professionals when it comes to the cloud. Good news: AIS Data Centers will provide as much transparency about our audited …

AITP Cyber Liability, July 23 in San Diego

Brian Wood Blog, Past Events

July 23, 2014 | DoubleTree Del Mar 11915 El Camino Real San Diego, CA 92106 Cyber Liability: What to do if your company becomes a victim of a cyber security incident and how to handle the triage. Have you had to deal with the legal or media ramifications of losing Intellectual Property? Has your company done its due diligence to …

Third-Party Security Risks: Got Visibility?

Brian Wood Blog

Newsflash: we (collectively) are falling short when it comes to implementation of best practices pertaining to minimization and identification of third-party cybersecurity risks. Summary by Fred Donovan in FierceITSecurity, original release by Protiviti and Shared Assessments. Emphasis in red added by me. Brian Wood, VP Marketing —— Despite high-profile breaches, firms failing to address third-party risks Companies are failing to …

Infographic: CyberSecurity in the Banking Industry

Brian Wood Blog

CDW put together the infographic below to summarize the state of affairs in banking industry cybersecurity. Summary: things are not as good as one would hope yet not as bad as one could fear. Summary by Fred Donovan in FierceCIO. Emphasis in red added by me. Brian Wood, VP Marketing —– Infographic: Banking customers blissfully unaware of rise in cyberattacks …

Cybersecurity Myths: Debunked

Brian Wood Blog

Summary: Don’t believe the hype. Keep calm and carry on. Don’t overreact. Article by Peter W. Singer and Allan Friedman in Wired. Emphasis in red added by me. Brian Wood, VP Marketing —– The 5 Biggest Cybersecurity Myths, Debunked “A domain for the nerds.” That is how the Internet used to be viewed back in the early 1990s, until all …

Beware the Emailed (Hacker) Golf Invitation

Brian Wood Blog

Executives like golf, right? And execs have valuable information? And hackers target people with valuable information, yes? QED I’ve always wanted to have a blog post with the title above. Mission accomplished. Article below by Ian Urbina in The New York Times. Emphasis in red added by me. Brian Wood, VP Marketing —— Hacker Tactic: Holding Data Hostage Hackers Find …

Look Both Ways Before Clicking the Link

Brian Wood Blog

When we were little we were taught to look both ways before crossing the street. That type of habit pattern helps keep us from being hit by a car, a bus, a bicycle, or even a jogger. Similarly, a good habit for us to develop regarding web usage is to view / confirm the URL before viewing a website’s content …

10 Expert Opinions on Cybersecurity

Brian Wood Blog

My three favorite snippets from the article below: “With the Internet of Things every company becomes a technology company, and every company becomes a security company.” “When you acquire a company, you inherit all of that company’s cybersins.” “There’s no one forcing companies to patch vulnerabilities to protect their users” Article by Kashmir Hill in Forbes. Emphasis in red added …

McAfee Study: Reported Cybercrime $400B Annually

Brian Wood Blog

$375B to $575B is the range estimated by a recent study for the impact of cybercrime globally. That’s a lot of Big Macs but what’s even more interesting is that most cybercrime may actually go unreported. The U.S. is number 1. Hooray? Summary article by David Weldon in FierceCIO, original piece by Jeremy Kirk in Computerworld. Emphasis in red added …

Hacker Passwords: Stronger than Yours? Uh, No

Brian Wood Blog

Like watching a movie about gangsters or members of a drug cartel, its eerily fascinating to peer into the lives and behaviors of the bad guys. Such is the gist of the article below regarding the strength (or not) of a bunch of hacker passwords. Summary article by Paul Mah in FierceCIO; original post by Antonín Hýža in Avast. Emphasis …