Cybersecurity and DDoS
DDoS Charles Parker, II Over the recent year, there have been a number of articles centered on hacking and attacks, intended to disrupt...
Please properly configure your WiFi
This St. Patrick’s Day proved to be rather interesting this year. As with years past, an Irish pub was visited. This happened to be...
New Ransomware Focus-Robots?
Ransomware and its effect on the targets is well-known. This is being used as an attack tool in nearly all the industries. The use of...
Not addressing prior security concerns is a bad idea: Mazda's same issues continue
We need to learn, as an industry, from our mistakes. When these are identified, as part of the SDLC, the oversights should be addressed...
Cryptocurrency Basics for Small Businesses
Cryptocurrency is big news these days. Articles appear in economic news streams, technology blogs, and retail trade publications. On the...
SHA-1 still in use..
In May 2017, IE and Microsoft Edge finally began to note the SSL/TLS certificates signed with the well-used SHA-1 hashing protocol as...
Universities are ripe targets: Michigan State University Compromised
Universities have been targets for years. There have been Universities that have been compromised multiple times within a year. The...
PDFs are Still Problematic
There are a number of documents used in the business setting. These include resumes in the Human Resources Department, budgets in in...
New IRS tax refund alerts on fraudulent tax refunds
The IRS issued two alerts in the last two weeks on cyber-crimes against tax preparers and taxpayers. The first alert, issued 2/2/18,...
As if the unemployed need one more thing to worry about
If you actively collect data from third parties, the collecting entity has a special responsibility. This is especially the case when the...