Similar Posts
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Why Don’t You Use a Password Manager?
I came across a recent survey that said that the vast majority of companies still don’t provide centrally managed password managers or require that they be used. Learn why this is a problem and what you should do about it. Audio Video
Old Attacks Never Die – USB Malware Spreader
In this case, it wasn’t the well known “candy drop” attack but rather an accidental USB attack. Still infected an entire hospital. This one is attributed to China. Learn more below.
Disaster Recovery for Password Managers and MFA apps
Many of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
Which CMMC Controls Can Be PoAMed?
First, what is a PoAM? A PoAM is, basically, a plan to fix any issues that were found during an assessment. Under CMMC, currently, a company can miss some controls and still get a provisional check mark. But, the rules as to what can be in a PoAM – that is pretty restricted. As is…
Security News Update for December 1, 2024
This week’s news includes: