Wednesday, December 26, 2012

Wednesday, December 12, 2012

Cyber Security: Why don't computer users take passwords seriously?

This article highlights interesting facts about password usage and describes how many people fail to take these security measures seriously.

Why don't computer users take passwords seriously? - Topix

Tuesday, December 11, 2012

Cyber Security: ICS-CERT Vulnerability Summary for Week of December 3

Click the link below to view the summary of cyber security vulnerabilities for the week of December 3 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB12-345.html


Thursday, December 6, 2012

Cyber Security: The 12 scams of Christmas

Internet shopping will reach its peak this season with 70% of people planning to shop online and 1 in 4 shoppers using mobile devices. Read about the most dangerous internet scams by clicking the link below.

12 scams of Christmas

Wednesday, December 5, 2012

Cyber Security Advisor Newsletter – Nov. 2012 vol. 14

I’m sure you’ve heard the saying "When it rains, it pours," meaning when things go wrong, they REALLY go wrong.    With the floods in Northeastern US, Northern California and  the flash flooding in the UK, I think we’ve had our share of weather.    I’m starting to get flooded now in a different way, as I’m sure you are too, with news about the latest attacks in our industry and against our clients.  I hope this message is not finding you or your organization too unprepared.

This month in Volume 14, with the rising popularity of Bring Your Own Device (BYOD), we thought it was appropriate to discuss this up and coming activity.

As we continue our efforts to educate  on the need to address cyber security, the details that rise to the top are consistent.      All successful Security Solutions are part of an overall program that addresses who will manage, maintain, and upgrade the solution for its lifetime.   We find too many firewalls that no one has looked at since it was installed or so many holes are punched through it, you might as well not have it in place.    The message is, consider what the needs are, develop a program, THEN determine the technical controls.    I know the geek in all of us makes us want to jump to the technology first.
                                                                                                  


Click here for this months issue.

Monday, December 3, 2012

Cyber Security: ICS-CERT Vulnerability Summary for Week of November 26


Click the link below to view the summary of cyber security vulnerabilities for the week of November 26 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB12-338.html