Would you like to know more?
…When I was in the US Navy you couldn’t even plug a USB into a workstation for fear of compromising the network; now ‘Wifi’ is being pumped through hanger bays, berthing’s, and cargo holds across the fleet. The unique problem that is presented with BYOD (Bring Your Own Device) cannot be overstated; Imagine the impossible task of juggling bees
What is War? Baby don’t troll me, no more. “War…War never changes” Fallout has been silently screaming that fact at us since the late nineties. While a lot has been written on this new “Hybrid-War”, I think these are the same tactics that have been in play since antiquity, we haven’t reinvented the wheel, we… [Read More]
You’re sitting at your computer when the screen goes blank. Not good. You try to restart it but it just displays the four words: “Boot Device Not Found”. What do you do? One of the key tenants of cybersecurity is Availability. If you have no way of recovering your files, you are not secure. … [Read More]
Have you received a phone call or an email from the IRS stating that you owe back taxes and a warrant will be issued for your arrest?
It was late, and I was about to sit down to read when there is a knock at the door. From the door I notice outside that there are city, fire and police vehicles with their lights on all the way down the street. I was greeted by a local water company employee who immediately… [Read More]
Do you know who is on your network? Wireless networks are everywhere. Unsecured and misconfigured wireless connections can allow someone to abuse the service that you pay for or try to compromise your computers. Older security methods like WEP are easy to crack. Mixing guests and production machines on the same network will put your… [Read More]
After a breach, user credentials can end up for sale on the dark web. How do you know if you are a potential victim of a security breach? https://haveibeenpwned.com @haveibeenpwned #TodaysTechTip #NCSAM #CyberAware #StaySafeOnline #DontBeNext
Do you share passwords with co-workers? If you do share passwords it will make it difficult for auditors to determine who may have accessed or changed information.
Are your company’s documents available on file sharing services like Google Drive and DropBox? Are you sure? These applications pose a huge threat to your company. #TodaysTechTip #NCSAM #CyberAware #StaySafeOnline #DontBeNext
“Common sense, ain’t so common” has got to be the most advice rolled up in a yokel adage I have ever heard. Everyone seems to think they are on the intelligent side of the argument, but the fact is if humans were just a fraction more cognizant of their actions online, we wouldn’t be seeing… [Read More]
Do you take quizzes and surveys on social media? Seemingly innocent exercises like; “What Disney Character are you?” or “We can guess your age” will divulge details about your life to total strangers. Details that could be used in one of your security questions for online accounts. #TodaysTechTip #NCSAM #CyberAware #StaySafeOnline #DontBeNext
You receive an email that there has been a shooting at your child’s school. It includes a link to the latest details. You click the link, your screen flashes a couple of times but the expected website does not open. You are later informed by IT that your computer is infected with a dangerous virus…. [Read More]