Cyber Thieves Cut Both Ways Identity theft was the 2nd most common complaint that the FTC (Federal Trade Commission) received in 2015. And unfortunately, identify theft is only getting worse. Consumers spend more money on computer security, and I commend this, but what they fail to recognize is that cyber thieves are also common criminals that often stoop… Read More »
Is Hacktivist Disruption Enough For Change?
I recently attended an exclusive roundtable discussion with The Verge for a event hosted by Story, a retail concept store with ever changing themes located in midtown Manhattan. Story re-invents itself about every two months and this time around it’s all about hacking including an interactive exhibit hosted by USA Network’s hit TV show Mr. Robot. The exhibit includes everything from vintage Atari arcade… Read More »
Is the Internet of Things a scary proposition for organizations?
The Internet of Things (IoT) is poised to be the ultimate technology disrupter. Companies are racing to build out Internet of Things businesses, but security is not at the top of the list. When security is considered low priority within any organization, the hairs on the back of my neck stand up. And security is… Read More »
Sony Screams About Hackers But They’ve Invaded Our Privacy For Years
The hack attack on Sony Pictures Entertainment that’s been making headlines over the last couple of weeks is just the latest in a line of security breaches at Sony that stretch back to 2011. Many companies get attacked just because they are vulnerable targets, but Sony seems to have raised the special ire of the… Read More »
Penetration Testing Basics
As computer networks become more complex, they become more vulnerable to hackers. These weak points can take the form of hardware, operating system bugs, software and users who don’t adhere to security policies. One of the best ways to uncover them is to get a hacker to break in. What is Penetration Testing? It’s essentially… Read More »
Cybersecurity Insurance & What You Need To Know
Every company that uses computers or the Internet needs to protect their assets, but how can companies prepare for threats that are so new they’re not even recognized? New technology can open security holes that aren’t detected until after cyber criminals have already broken in. Hackers develop new viruses and other malware every day, faster… Read More »
Printers Are the Invisible Security Risk on Your Network
The days of printers as simple unsophisticated devices are long gone. Today’s printers are specialized computers that have their own processors, RAM and storage. They also have easy setups and internal web pages for adjusting settings and updating firmware. The printer manufacture’s goal is to make their devices faster, more versatile and more user-friendly to… Read More »
Gmail Account Hack Shows Why Strong Passwords Are a Must
On September 9th a hacker published a list of 5 million Gmail accounts with associated passwords. The passwords may not have been the password for the account in question, and there’s no telling how old the passwords are or where they originally came from. For example, if the account came from the LinkedIn hack from… Read More »