30th Apr 2014

0 Comments

“2014 Data Breach Investigation Report”

Comprehensive Reports show cyber espionage up again. The reports show a 3 times higher rise in 2013. There seems to be no let up so keep vigilant. You may be next! Are you an easy…

Read More

29th Apr 2014

0 Comments

Taking down the Underground Economy

In past big breaches like (Target, etc.), the cyber crooks sell the data through underground online criminal forums. The fraudsters are still stirring the coals. The underground economy is still healthy. Stay awake and alert….

Read More

25th Apr 2014

0 Comments

Scam of the Week: Blended XP Phishing-Security Threads

Tablets, phablets, and smart phones transferring and restoring data means the data is “in the wind” and can be “shot down!”  Moving data is vulnerable data. Rule 1: Don’t fear the reaper, but don’t help…

Read More

24th Apr 2014

0 Comments

Scam of the Week: Blended XP Phishing-Security Threads

Small breaches still result in hefty fines. HIPAA is serious and will impose penalties! Lost or stolen “unencrypted devices” (frequently laptops) are the culprits. Is Anything Missing? Encrypt all of your data and as you…

Read More

23rd Apr 2014

0 Comments

Open SSL and Heartbleed

The Heartbleed vulnerability was accidentally introduced several years ago to OpenSSL, the encryption platform used by more than two-thirds of the Internet, but it wasn’t discovered till the beginning of this past April. Since then,…

Read More

23rd Apr 2014

0 Comments

Digital Certificate Based Authentication

A password is something that fits in the memory of a user, and the user chooses it. Since authentication is about verifying the user physical identity remotely (from the point of view of the verifier),…

Read More

23rd Apr 2014

0 Comments

Authentication In World of WWW and Internet

In the world of WWW and Internet, verifying a person’s identity is often required to secure access to confidential data or systems. To create unique identification, user needs to be authenticated. Authentication is the process…

Read More

23rd Apr 2014

0 Comments

This is based onCyberheist News “Scam of the Week: Blended XP Phishing-Security Threads”

April 8-Last Day of Support for Windows XP. End users can expect to see scams trying to fool you and aid the hackers. Phishing emails or cold calls from “Windows Help Desk” or “Window support”!…

Read More

22nd Apr 2014

0 Comments

This is based onCIO Magazine “Wilson, Sonsini, Goodrich &Rosati BYOD Policy Consideration”

BYOD Policy Decisions from the top. Read the advice and practice what they preach.  Employer, Employee, Vendor or Temp., It’s getting more pervasive & important for Privacy, Encryption, & Safety!  Employer: Set new clear BOYD…

Read More

21st Apr 2014

0 Comments

This is based on CIO Magazine “BYOD and Security.”

The Y in BOYD is Your. Not your employer, not your buddy, but YOU. The content and liability are yours! COPE= Corporate Owned Personally Liable.  Same risks, but the company calls the shots. No biggie….Yet!The…

Read More

18th Apr 2014

0 Comments

This is based on CRN Magazine “5 Essential facts about HeartBleed and open SSL.”

Heartbleed   wounds are still being discovered. It was “fixed” in 4 days, but it’s been “bleeding” since 2112. Are you safe? Sites affected (Yours?) had/have “data in transit” I repeat: Moving data is vulnerable data. …

Read More

16th Apr 2014

0 Comments

This is based on Tech Target Magazine “BYOE (Bring Your Own Encryption).”

BOYE is a cloud computing security model. The user encrypts their software and encryption keys first!  Then they can move the safe data to the cloud.  Get It? The coded data goes through the encryption…

Read More

15th Apr 2014

0 Comments

This is based on InfoWorld Magazine “Condoleezza Rice’s Appointment to Dropbox Board sparks internet outcry.”

Dropbox appointed Condi Rice to B.O.D. and announced new “Dropbox for Business”. Good Timing, Good Luck Ms. Rice. The messages for Ms. Rice left at Stanford Friday were not immediately answered. 100 to 1, she…

Read More

14th Apr 2014

0 Comments

This is based on Information Security Magazine “BYOD security strategies: Balancing Risks and Rewards.”

BYOD convenience Great but Risk is high! BYOD security company policies are needed! Use of mobile devices grows as employers struggle with secure use of BYODs. High wire balancing act between risks and rewards of…

Read More

11th Apr 2014

0 Comments

This is based on Information Security Magazine “BYOD security strategies: Balancing Risks and Rewards.”

You can’t beat em, Better join em. Make BOYD Policy crystal clear to all users in your company. Get a Handle on the BOYD Risks. Seek information from others. Once Bitten, Twice Shy. Go to…

Read More

10th Apr 2014

0 Comments

This is based on PC World Magazine “Here’s how to best secure your data now that NSA can crack almost any encryption.”

The NSA has a huge budget (250 million). Few hackers will get that big. Take a tip from NSA. Encrypt everything now. The NSA doesn’t care about your data. The Cyber crooks do! Use that…

Read More

8th Apr 2014

0 Comments

This is based on Wall Street Journal Tech News “Yahoo Faces Balancing Act between ADS and Encryption.”

Yahoo is strengthening encryption technology for e-mail, home pages on multiple sites to combat the cyber crooks. “The project will probably never be finished” say Yahoo’s Alex Stamos. He’s right. It’s forever for all of…

Read More

7th Apr 2014

0 Comments

This is based onCyberheist News “Alert CryptLocker has a new competitor that is worse: Cryptodefense”

This is based on Cyberheist News “Alert-CryptLocker has a new competitor that is worse: Crypto defense” by Stu Sjouwerman Cryptodefense is targeting the US in a big way! This is a new and very nasty…

Read More

5th Apr 2014

0 Comments

This is based onCyberheist News “Alert CryptLocker has a new competitor that is worse: Cryptodefense”

Sheriff, there’s a new criminal in town!  Cyberlocker’s has a new competitorcalled  Cryptodefense.  New & nastier ransomware too! Cryptodefense is higher in damage and price. Ransomware goes up to $500 for the average hack. This…

Read More

5th Apr 2014

0 Comments

This is based onData Security Blog “Forecast Cloudy with a chance of Encryption”

Task: Protect your assets from outside danger. Look up these words: WAF, IDS, AV, the research will do you good!  Big Data means Big Storage means Big Encryption responsibility!  First Encrypt (There are tools), then…

Read More