Blog Stats
- 75,849 hits
Monthly Archives: October 2015
Don’t be a Billy: NCSAM
A fun, old-ish video on Cyber security.
Posted in Security Blog
Tagged cyber risk, NCSAM, video tutorial
Comments Off on Don’t be a Billy: NCSAM
Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
Posted in Security Blog
Tagged 2015, CIA, CIA Director John Brennan, email, email fraud, hacked, Homeland Security Secretary Jeh Johnson, Security Awareness, social engineering
Comments Off on Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
I’ve been playing with Sway
October 25, 2015
Comments Off on Weekend of Fun
Your Evolving Digital Life
Click the graphic to learn more about NCSAM!
Posted in Security Blog
Tagged 2015, computer security, infographic, Internet of Things, NCSAM, Security Awareness
Comments Off on Your Evolving Digital Life
USB Killer… 2.0!
Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading
Posted in Security Blog
Tagged 2.0, 2015, computer security, Dark Purple, hacking, malware, mission impossible, usb, USB Killer
Comments Off on USB Killer… 2.0!
Damien Has a Job!
Here is Damien after his, technically, first day of work! Mostly orientation. He’s just getting home after a short 4 hour shift. I’m so proud of him!
Posted in life
Comments Off on Damien Has a Job!
Telemarketer Payback with Social Engineering
Social engineering is a very useful skill to have. But please use your powers with the highest level of ethics. See image below.
Posted in Security Blog
Tagged Information Technology Security Awareness, lol, social engineering, telemarketer
Comments Off on Telemarketer Payback with Social Engineering
Happy Two-Factor Tuesday!!!
Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading
Posted in Security Blog
Tagged 2015, cyber risk, NCSAM, passwords, risk, security, Security Awareness, two-factor
Comments Off on Happy Two-Factor Tuesday!!!
Revisiting Home Depot
Remember last September? It’s been just over a year since the Home Depot data breach. So far, the breach has cost Home Depot around $232 million and it’s expected to go into the BILLIONS as lawsuits get filed by smaller … Continue reading
Posted in Security Blog
Tagged 2014, billions, cyber liability insurance, home depot, insurance
Comments Off on Revisiting Home Depot
Scottrade Breach
“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading
Posted in Security Blog
Tagged 2013, 2014, 2015, breach, cybercrime, hacked, information security, phishing, Scottrade, social engineering
Comments Off on Scottrade Breach