Department of Homeland Security Warns of Cyber-Attacks by Iran -
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Foreign Relations ,
Hackers ,
Information Sharing ,
Iran ,
Microsoft ,
NYDFS ,
Operating System Developers ,
Personally Identifiable Information ,
Risk Management ,
Risk Mitigation ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
1/10/2020
/ Assassinations ,
Computer Servers ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Databases ,
Email ,
Email Policies ,
Hackers ,
Infrastructure ,
Iran ,
Microsoft ,
Operating System Developers ,
Phishing Scams ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more
Considering the recent Equifax data breach which put an estimated 145.5 million American’s identity at risk, main stream media outlets are starting to ask an important question; if we can’t stop data breaches, how do we...more
IT professionals have long understood the importance of changing the default password for network connected hardware devices (printers, switches, wireless access points, etc.). In the world of the Internet Of Things it seems...more
It is said that a chain is only as strong as its weakest link. Often the same is said for an organization’s data privacy & security defensives. Could it be that the ubiquitous ATM machine is the weak link to the banking...more
Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more
Traditionally it was very common for organizations to adopt an optimistic security model. Give everyone access to everything unless specifically denied access to sensitive areas, like HR or Finance. While this approach is...more
With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more
10/27/2015
/ Android ,
Cell Phones ,
Data Privacy ,
Data Security ,
Encryption ,
Google ,
iPhone ,
Mobile Devices ,
OEM ,
Popular ,
Smartphones ,
Wireless Devices ,
Wireless Industry ,
Wireless Technology
Encryption is a basic term used to describe the act of encoding data, files, and digital communications such that only those with the cipher could read or understand the information. Think back to the decoder ring you got in...more
8/17/2015
/ Data Privacy ,
Data Security ,
Data Transfer Providers ,
Digital Communications ,
Dropbox ,
Email ,
Encryption ,
File Sharing ,
Google ,
Laptop Computers ,
Privacy Policy