November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,644 hits
Tag Archives: information security
Top 5 CyberThreats of 2016 To Attack or Defend Against
Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading
Posted in Security Blog
Tagged 2016, advanced persistent threat, application security, APT, behavioral, cross site scripting, cyber risk, hackers, information security, insider threats, personnel risk assessment, pra, Security Awareness, social engineering, sql injection, top 5, xss
Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against
Mark Zuckerberg’s Accounts Compromised
Facebook founder, Mark ‘Zuck’ had his Twitter and Pinterest accounts compromised after the LinkedIn data breach that happened back in 2012, through the recent sale of the emerged data. It’s proof positive that one must diversify usernames and passwords, close … Continue reading
Posted in Security Blog
Tagged 2016, breach, hacked, information security, linkedin, passwords, Zuckerberg
Comments Off on Mark Zuckerberg’s Accounts Compromised
Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity
Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!
Posted in Security Blog
Tagged 2016, CIA, cyber risk, hackers, hacking, information security, Information Technology Security Awareness, Security Awareness, Security Strategy, SSA, Will Hurd
Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity
LinkedIn Breach Data Leaked
Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2012, 2016, 2fa, cybercrime, hacked, hackers, information security, linkedin, passwords, security, Security Awareness, two-factor
Comments Off on LinkedIn Breach Data Leaked
60% of BYOD Users Use the Same Device to Download Pirated Content
In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading
Posted in Security Blog
Tagged 2016, android, corporate data, infographic, information security, iPhone, malware, mobile, Mobile Device Management, mobile security, Security Awareness, smart phones, smartphones
Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content
Wireless Mice Leave Corporate Networks Vulnerable To Attack
Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading
Posted in Security Blog
Tagged 2016, bastille, bluetooth, hacking, information security, Information Technology Security Awareness, keyboard, mouse, reuters, security, wireless
Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack
USB Compromise Reveals 22,000 ISIS Identities
A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading
Posted in Security Blog
Tagged 2016, Data Loss Prevention, DLP, information security, isis, privacy, security, Security Awareness, usb
Comments Off on USB Compromise Reveals 22,000 ISIS Identities
Cybersecurity Bill of Rights Adopted by NAIC
On October 14th, 2015, the National Association of Insurance Commissioners (co-developer of the Model Audit Rule) has adopted the Cybersecurity Bill of Rights The Cybersecurity Bill of Rights describes what you can expect from insurance companies, agents, and other … Continue reading
Posted in Security Blog
Tagged 2015, compliance, information security, privacy, risk, security
Comments Off on Cybersecurity Bill of Rights Adopted by NAIC
Scottrade Breach
“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading
Posted in Security Blog
Tagged 2013, 2014, 2015, breach, cybercrime, hacked, information security, phishing, Scottrade, social engineering
Comments Off on Scottrade Breach
19 Laws of Information Security
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading
Posted in Security Blog
Tagged 2015, Immutable Laws, information security, Information Technology Security Awareness, Security Awareness
Comments Off on 19 Laws of Information Security