InfoSec Training – Still Pertinent
In each organization, there are the different areas of vulnerabilities. As with any organization, these can be located with the software,...
Hacking Continues to Follow Economic Models
In economics, there are the basic supply and demand curves. As these move up or down, and left or right, dependent on the circumstances,...
New Version of DDoS Increasing CISO’s Blood Pressure
Generally, as evidenced by recent attacks, with a DDoS attack mass packets are sent to the target. These may be sent from a bot army or...
51% of SMBs attacked by ransomware according to survey
It seems that no business is too small to be a target of ransomware. Ponemon Institute, a research company that focuses on information...
Drones and Small Business Cybersecurity
Drones are being used for many creative tasks. They are now used to deliver packages and take-out. Pizza express, anyone? Cowboys may no...
Preparing for an Attack & Breach
The attackers have branched out and are no longer merely focusing on one or two industries, such as DoD contractors or hospitals. This is...
SSH Vulnerabilities Still Active from Over a Decade Ago
Recent DDoS attacks have shown how important yet unsecure the IoT devices really are. These are utilized through relatively many...
Cell Phone Towers Are Also Vulnerable
The typical cell phone towers are omnipresent through the countryside and in the cities. In the cities they may be located on parking...
Cyber Security Predictions for Small Businesses and Organizations
The good news: most companies and individuals are more aware of cyber risk than previously. Cyber security measures do work. The bad...
The Generic Blanket Training is not Appropriate or Effect
Every year corporations and businesses go through the annual, employee dreaded security training. Their eyes become glazed over and the...