Similar Posts
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.
Draft Kings Attack Recommendations
Some users of the sports betting site Draft Kings discovered that they were locked out of their betting account and, more importantly, their bank accounts were drained. Learn how this happened and what you can do to minimize this risk. Note that this is attack is not limited to Draft Kings or sports book sites….
Protecting Website Security Question Answers
In light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
Is Blockchain Secure
The value of Bitcoin and other virtual currencies seems to vary a bit. Three months ago, Bitcoin was trading at about $47,000 and today it is trading at about $21,000. But, while that could be a big problem for some speculators, that is not what I am concerned about. The core behind all of the…
Multi-Factor Authentication is NOT a Silver Bullet
For as long as there have been computers, there have been hackers. It is a cat and mouse game. Multi-factor authentication definitely ups the stakes, but there are some things that you should know that might affect your choice of MFA solutions. Audio Video
Lessons to Learn from the MGM-Caesars Breach
The breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…