Similar Posts
Lessons to Learn from the MGM-Caesars Breach
ByadminThe breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…
What is a Shared Responsibility Model?
ByadminIf you don’t know what this is and don’t have it documented for each of your external and cloud providers, the first step is to listen to this post. The second step may be to contact us for assistance. Ignoring it is not an option that will turn out well. It leads to outages and…
In Honor of Valentine’s Day – Romance Scams
ByadminThe FBI says that 19,000 people reported losing over $700 million to romance scams last year. Learn more about these scams by watching or listening. Links mentioned in the video are: FBI National Cybersecurity Alliance Pig Butchering Scams
Internet of Things Dumpster Fire
ByadminThe Internet of Things refers to a class of smart devices that are typically used to automate things. This can be anything from a smart TV or smart door lock to an automated oil refinery and everything in between. Unfortunately, the security of many of these devices is to be really kind, lacking. The hackers…
Security by Design – A Great Example
ByadminRecently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Staying Safe Online – Passwords
ByadminI see a lot of advice on passwords but unfortunately, some of it is wrong. Watch this short video to learn about managing your passwords.