November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,635 hits
Tag Archives: Information Technology Security Awareness
Five Habits to be Unhackable
By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading
Posted in Security Blog
Tagged 2015, information security, Information Technology Security Awareness, privacy, Security Awareness
Comments Off on Five Habits to be Unhackable
Survey Says 80% of Security Risks are Users
Bromium surveyed 100 security professionals to see what they thought their biggest security risk was. Through my own research, I have found that the best way to give security awareness training, is NOT this way, with one time security awareness … Continue reading
Posted in Security Blog
Tagged 2015, compliance, Information Technology Security Awareness, risk, Security Awareness
Comments Off on Survey Says 80% of Security Risks are Users
SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China
The FBI was brought in to investigate The Scoular Company after the controller wired $17.2 million dollars to China through their accounting firm, KPMG. There were emails to the controller from an email address that resembled but was not the … Continue reading
Posted in Security Blog
Tagged Information Technology Security Awareness, Omaha, phishing, Scoular, Security Awareness, social engineering, spear phishing, spearphishing, two-factor
Comments Off on SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China
Game of Hacks
Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, Malicious Code and Application Attacks, Secure Coding, Security Awareness Video Games, Software Development Security
Comments Off on Game of Hacks
Worst Passwords of 2014
An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading
Posted in Security Blog
Tagged 2014, 2015, authentication, Information Technology Security Awareness, passwords, reputational security, two-factor
Comments Off on Worst Passwords of 2014
Presidential Proposal List
As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading
Posted in Security Blog
Tagged 2015, cybersecurity, Information Technology Security Awareness, POTUS, President, Security Awareness
Comments Off on Presidential Proposal List
Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee
This was in the news yesterday, it is proof that social engineering is the master key to unlock many locks. It is also proof that to keep your lock secured, security awareness and training is needed with the end goal … Continue reading
Posted in Security Blog
Tagged 2015, Fox News, Information Technology Security Awareness, John McAfee, passwords, phishing, Security Awareness, social engineering, sony, spoof, spoofing, Stuart Varney
Comments Off on Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee
Protecting Personal Information
Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, passwords, Protect Your Personal Information, two-factor
Comments Off on Protecting Personal Information
Stealing Biometrics & Bypassing Authentication
Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading
Posted in Security Blog
Tagged 2015, biometrics, Chaos Computer Club, facial recognition, fingerprints, hackers, hacking, Information Technology Security Awareness, Jan Krissler, proof of concept, retina, two-factor, video tutorial
Comments Off on Stealing Biometrics & Bypassing Authentication
Basic Computer Security
There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. 1. Install security software: There is a lot of security software available and most well … Continue reading
Posted in Security Blog
Tagged 2015, back to basics, basics, computer security, Information Technology Security Awareness, keep a clean machine
Comments Off on Basic Computer Security