Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...

Cyber War isn’t Coming It is already Here!

Cyber War isn’t Coming It is already Here! Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

Zeroing In On our Industrial Control Systems

Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks.  Now they are focusing their efforts on SCADA systems often...

Metrics Can Not Adequately Describe The Pain of Cybercrime

Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...

Nebulous Budget and Security Concerns Affecting Cloudy Decisions

Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about “the cloud,” and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years....

Bomb’s will not be Iran’s retaliation – Technological hacks are more likely

Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​ Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...