Cybercrime: Alert to small and mid-sized organizations
As regular readers know, I frequently consult with and counsel small-to-medium businesses (SMB). I also work with non-profits, volunteer groups, and sole-proprietorships. A specific warning is...
View ArticleNew Year, New Tricks… Old Standby: Cyber-crime
As we enter 2013, many of us are excited by new projects, new enablements, and an expansion of systems and related capabilities. I always feel a sunny optimism when embarking on projects, and I...
View ArticleCyber-crime: Awareness for 2013… and beyond…
In continuing from yesterday, let’s examine cyber-crime in a bit more detail. Before we get into the actual mechanics of intrusions and rip-offs, let’s fully understand the true perils inherent in...
View ArticleCyber-crime Continued: Attacks’ methodology
No matter the nefarious goal of attack, subsequent entry, and exploitation, (such as those mentioned in articles below), there are basic steps for breaking your defenses, and taking advantage of the...
View ArticleMalware: Insertion and Types
In continuing our awareness for cyber-crime, recognize that after an entity penetrates a network for access, far more than an episodic outcome can occur (such as a one-time theft of data or money, for...
View ArticleCyberwar: A consideration for business protections?
Hey, don’t blame me; no fan of war, I. But people are actually speculating on the nature of the next big war. Of course, there’s the nuclear component, and concomitant fear. But hopefully the MAD...
View ArticleCybersecurity – The local impact… inside and out
The other day, in the article Cyberwar: A consideration for business protections?, we asked a few questions vis-à-vis cyberwarfare: Outside: What are the modern organization’s possible contributions...
View ArticleCyberwar Between Business Competitors – This blog’s prediction come true?
It’s just been reported that Burger King’s Twitter feed was hacked. The Burger King logo was replaced with McDonald’s golden arches logo. Further, a tweet indicated that “the whopper flopped” and that...
View ArticleCyber Awareness: Personal Security
People have been asking me what they can do for their home environments, and related cyber security – some tips are provided below. First, recognize that social engineering is the biggest factor in...
View Article
More Pages to Explore .....