Similar Posts
Banking Social Engineering Scams are Alive and Well
The easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…
Google Adds Android Privacy Feature
We all know that the big platforms track absolutely everything that we do. Now Google has added a feature to Android to reduce that tracking but I dare you to find it. The feature is not a magic fix but still a good tool. If you want to reduce Google’s tracking of you, you should…
What Should You Preserve When Employees Leave?
Employees come and go and 99% of the time it is innocuous. Occasionally companies get involved in lawsuits as well. Properly preserving evidence (or preserving it at all) can be the difference between finding out what you need or prevailing in a lawsuit. Are you prepared? Audio Video
Disaster Recovery for Password Managers and MFA apps
Many of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
Protecting Website Security Question Answers
In light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.