Are you doing enough to protect your smartphone from hackers? Security experts predict mobile malware to increase in 2013.
Cyber criminals could increasingly look to attack, hijack smartphones in 2013 - Topix
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Wednesday, December 26, 2012
Wednesday, December 19, 2012
Cyber Security: 8 holiday email scams to avoid
Read about 8 holiday email scams to be on the lookout for this season.
Be alert: Avoid holiday email scams - Topix
Be alert: Avoid holiday email scams - Topix
Wednesday, December 12, 2012
Cyber Security: Why don't computer users take passwords seriously?
This article highlights interesting facts about password usage and describes how many people fail to take these security measures seriously.
Why don't computer users take passwords seriously? - Topix
Why don't computer users take passwords seriously? - Topix
Tuesday, December 11, 2012
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 3
Click the link below to view the summary of cyber security vulnerabilities for the week of December 3 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB12-345.html
http://www.us-cert.gov/cas/bulletins/SB12-345.html
Thursday, December 6, 2012
Cyber Security: The 12 scams of Christmas
Internet shopping will reach its peak this season with 70% of people planning to shop online and 1 in 4 shoppers using mobile devices. Read about the most dangerous internet scams by clicking the link below.
12 scams of Christmas
12 scams of Christmas
Wednesday, December 5, 2012
Cyber Security Advisor Newsletter – Nov. 2012 vol. 14
I’m sure you’ve heard the saying "When it rains, it pours," meaning when things go wrong, they REALLY go wrong. With the floods in Northeastern US, Northern California and the flash flooding in the UK, I think we’ve had our share of weather. I’m starting to get flooded now in a different way, as I’m sure you are too, with news about the latest attacks in our industry and against our clients. I hope this message is not finding you or your organization too unprepared.
This month in Volume 14, with the rising popularity of Bring Your Own Device (BYOD), we thought it was appropriate to discuss this up and coming activity.
As we continue our efforts to educate on the need to address cyber security, the details that rise to the top are consistent. All successful Security Solutions are part of an overall program that addresses who will manage, maintain, and upgrade the solution for its lifetime. We find too many firewalls that no one has looked at since it was installed or so many holes are punched through it, you might as well not have it in place. The message is, consider what the needs are, develop a program, THEN determine the technical controls. I know the geek in all of us makes us want to jump to the technology first.
Tuesday, December 4, 2012
Cyber Security: Ransomware attacks more frequent
Instances of ransomware, a form of online extortion, have increased significantly over the past year.
http://news.cnet.com/8301-1009_3-57548314-83/ransomware-a-growing-menace-says-symantec/?part=rss&tag=feed&subj=News-Security&Privacy
http://news.cnet.com/8301-1009_3-57548314-83/ransomware-a-growing-menace-says-symantec/?part=rss&tag=feed&subj=News-Security&Privacy
Monday, December 3, 2012
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 26
Click the link below to view the summary of cyber security vulnerabilities for the week of November 26 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB12-338.html
Subscribe to:
Posts (Atom)