Similar Posts
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
What Should You Preserve When Employees Leave?
Employees come and go and 99% of the time it is innocuous. Occasionally companies get involved in lawsuits as well. Properly preserving evidence (or preserving it at all) can be the difference between finding out what you need or prevailing in a lawsuit. Are you prepared? Audio Video
Draft Kings Attack Recommendations
Some users of the sports betting site Draft Kings discovered that they were locked out of their betting account and, more importantly, their bank accounts were drained. Learn how this happened and what you can do to minimize this risk. Note that this is attack is not limited to Draft Kings or sports book sites….
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Why Don’t You Use a Password Manager?
I came across a recent survey that said that the vast majority of companies still don’t provide centrally managed password managers or require that they be used. Learn why this is a problem and what you should do about it. Audio Video
The Risk of BYOD – Non-Managed Devices
Many companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…