Wednesday, September 26, 2012

Cyber Security: Brain hacking? Not as impossible as you might think

New technology suggests that hackers could potentially steal information right from your mind using brain computer interfaces (BCIs) or neuro-headsets that send signals emitted over Bluetooth devices. Early studies show that these signals can reveal private information such as birth month, PIN numbers, bank names, and acquaintances, which increase the chances of hackers correctly guessing your passwords.


Wednesday, September 19, 2012

Cyber Security: No device is safe from hackers

With more than 90 million types of malware now on the rise, PCs are not the only devices in danger of being hacked. Smartphones, social media accounts, and other websites have become major targets for cybercrime, whether hackers are infecting your device through web site visits or virtually taking control of your smartphone and holding it for ransom in exchange for money.



Wednesday, September 12, 2012

Cyber Security: Does Cybercrime cost $1 Trillion?

Does cybercrime really cost $1 trillion?  According to some Washington thinktanks who just poured over the research, the answer may stun you....YES!  What may stun you even more is that number might even be low.

http://www.propublica.org/article/does-cybercrime-really-cost-1-trillion


Tuesday, September 4, 2012

Cyber Security Advisor Newsletter - Aug 2012 vol 11

This past month, cyber attacks on industrial companies were common news reports.    There has been significant damage to companies’ IT networks and infrastructure.  I’ve seen postings of their router/firewall passwords….even their CEO’s email password. We will soon see a full court press from  all sorts of IT vendors selling  their latest security innovation or products.  Buying the latest firewall might make them feel more secure, but unless it’s part of a larger program, I’m afraid they are no better off.  And let’s face it, while these vendors think they are doing the right thing, they don’t really understand the environments or safety risks our clients are challenged with daily. 

We see the need to assist our clients and are prepared to suggest a planned approach that covers a defense-in-depth model with supporting practices of Incident Response, Disaster Recovery, System Monitoring, among others.  The Invensys Critical Infrastructure and Security Practice (CISP) has the skills and the resources to help our clients no matter what industry they are in. We understand that a comprehensive cyber security program is so much more than firewalls and anti-virus. Invensys CISP is structured to help with the entire cyber security program.