Category: Security

Checklist

Corporate Security Checklist

 |   |  Business & Strategy, Security

In this day and age, cybersecurity is everyone’s job. That said, I recognize that with news of a new breach or hack reaching the mainstream media almost every day, it can be daunting trying to protect yourself – never mind your entire organization.

Read More >

New York Wall Street Sign

We Can All Learn From NYDFS Mandatory Cyber Security Regulations

 |   |  Security

On March 1st of 2017, New York became the first state to enact state-mandated cyber security guidelines for companies regulated by the state Department of Financial Services. These guidelines include 23 sections discussing specific technical safeguards financial institutions must have in place, such as data encryption, multi-factor authentication, security training for employees, appointment of a chief information security officer, and

Read More >

Black and White Dartboard with Darts

Negligence and Misconduct: The State of Cybersecurity Breaches

 |   |  Security

Not a day goes by that I do not see another security breach or system flaw being released. On Thursday, September 7, Equifax announced a major data breach affecting records for as many as 143 million American consumers. Nearly half the U.S. population may have had their Social Security numbers, drivers license numbers, birth dates, addresses and other sensitive information

Read More >

CyberSecurity

What You Need to Know About Petya Ransomware

 |   |  Security

You have likely heard the sayings “don’t reinvent the wheel,” and “imitation is the highest form of flattery.” Both aptly apply to Petya, a threat currently affecting organizations worldwide. To explain, Petya is not new. It was first discovered in 2016 as a form of ransomware that would not only encrypt files on the computer but also infect the Master

Read More >

Hover Link

“Don’t Hover” Is the New “Don’t Click”

 |   |  Security

In the past, in order to see the true URL of a website, email address or file – all you had to do was hover your mouse over a link to verify that you were going to be sent in the right direction. Now, attackers have found a way to exploit even that.

Read More >

The Weakest Link

 |   |  Security

Your organization is much more likely (2:1) to have an IT security incident caused by an internal user rather than by someone from the outside.

Read More >

Global Security Event

Post Cyber Event Analysis: What Did We Learn?

 |   |  Security

I have been talking to many people during the last several days regarding this “global cyber ransomware event.” It dawned on me that this may finally help people, especially Microsoft, look at things a little differently.

Read More >

Wallet and Credit Card

Social Engineering? Who Falls For That?

 |   |  Security

Even if you don’t work in the IT industry, you have heard about different types of scams that use social engineering. The classic Australian Lottery where you get an email saying that you have won the lottery; but you have to pay a sum of money to collect it, or the “Grandparent Scam” where a distant grandchild calls to say they are in trouble and needs money.

Read More >