Similar Posts
Why Dark Web Monitoring Is Critical
The dark web is where most of the content is illegal and most of the traffic is about how to do illegal deeds. It is also where, for example, credentials to the Los Angeles School District network were available for sale prior to the ransomware attack on the district’s network earlier this month. Likely the…
Technical Debt
Are you managing your technical debt? Do you even understand what technical debt is? Does your management and Board (if there is one) understand that unaddressed technical debt is like a bottle of nitroglycerin just waiting to be jarred in the wrong way. And we just saw a massive example (as in their technical debt…
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Disaster Recovery for Password Managers and MFA apps
Many of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
Security Hanging by a PIN
The most important part of your digital security is protected, typically, by a 4 digit PIN, assuming it is protected at all. Learn what this resource is and why it is at risk. audio video
Draft Kings Attack Recommendations
Some users of the sports betting site Draft Kings discovered that they were locked out of their betting account and, more importantly, their bank accounts were drained. Learn how this happened and what you can do to minimize this risk. Note that this is attack is not limited to Draft Kings or sports book sites….