Be afraid. Very afraid. And only open emails that don’t contain malware. And if that doesn’t work for you, then consider cyber security assistance from AIS. Article by Matt Egan in Fox Business. Emphasis in red added by me. Brian Wood, VP Marketing ——- Cyber Shakedown: Hackers Unleash Mafia-Style Extortion Tactics Scott Heiferman received a disturbing email one recent Thursday …
Are You Protecting Your Privacy? Didn’t Think So.
The Boy Who Cried Wolf is one of Aesop’s Fables. According to an inside source at Wikipedia, “The tale concerns a shepherd boy who repeatedly tricks nearby villagers into thinking a wolf is attacking his flock. When one actually does appear and the boy again calls for help, the villagers do not come thinking that it is another false alarm …
When Is DDoS a Ruse?
The article below highlights how a distributed denial of service (DDoS) attack can be used as a ruse to direct attention “over here” while the bad guys get to work “over there”. It also points out the value of outsourcing certain portions of IT security to an external provider — one who likely has significantly more experience dealing with such …
Perimeter Defense: Still Secure?
The strategy used to be all about building thick, tall walls and stocking the moat with alligators: the perimeter defense. Nowadays, IT security staff are better off assuming that the bad guys (and the good guys — employees — sometimes doing bad or stupid things) have already breached the perimeter and are on the inside. Now what? Article by Linda …
Compliance Officers Not Involved in Cyber Security?
One danger of specialization is silo-ization and gaps. “Sorry, that’s not my area of responsibility; I do X. Hopefully Bob in IT has it covered.” Yeah, let’s hope. Or better yet, let’s have a single-subject meeting with all the relevant players to outline explicitly who is responsible for what. Article posted on Help Net Security. Emphasis in red added by …
WSJ “A List” Up-and-Comer: Cybersecurity
Now being discussed in a corporate boardroom near you. [And if it’s not being discussed, it should be!] Article by Danny Yadron in WSJ, The Wall Street Journal. Emphasis in red added by me. Brian Wood, VP Marketing —– Corporate Boards Race to Shore Up Cybersecurity Directors Grapple With Issues Once Consigned to Tech Experts After a series of high-profile …
Hospital Devices: Easy to Hack
This is scary stuff. Beyond all the potential device hijinks, just think how quickly electronic medical records could be populated with gibberish, false readings, and red herrings from ne’er-do-wells. Here’s hoping that hospital IT staff are as paranoid as Carrie Mathison on Homeland. Article by Kim Zetter in Wired. Emphasis in red added by me. Brian Wood, VP Marketing ——- …
Infographic: Data Loss
The data loss infographic below from Imprima (http://www.imprima.com/) was posted in FierceITSecurity. The lead-in: Close to three-quarters of businesses that suffer a major data loss close down within 24 months, according to an infographic put together by security firm Imprima. This “suggests that the most effective strategy will be to focus on preventing breaches from occurring in the first place. …
Eddie Snowden’s Paper Anniversary
Summary: the sky is not falling and personal responsibility is as important as it ever was. First article by John Zorabedian in Naked Security and second article by Mark Stockley, also in Naked Security. Emphasis in red added by me. Brian Wood, VP Marketing ——- What we learned from Edward Snowden Edward Snowden now holds a permanent place in the …
CommNexus Security SIG, June 5 in San Diego
June 5, 2014 | CommNexus UTC 4225 Executive Square, Suite 495 San Diego, CA 92037 7:30 to 9:30 AM Financial Crimes using the Internet have dramatically increased. The use of crime-ware applications like Zeus, Phoenix, Spy-Eye and Citadel have reaped havoc against banking institutions and their customers. Security Consultants from Secure Network will explain how these applications in combination with …