Top 3 cyber security services that even an ostrich would want

15 Jun Top 3 Considerations for Cyber Security Services

There are many organizations out there that provide onsite cyber security assessments as well as remote penetration testing services. Before you select your future cyber security services provider, here are a few things you may want to consider. Cyber Security Services Provider: Top 3 Considerations #1 – Clearly understand what the you want from the cyber security assessment When an organization solicits input...

Read More
securing cyberspace on NATO agenda

13 Jun Formal Recognition by NATO In Securing Cyberspace

Securing cyberspace becomes official – and it’s taking place in our own companies and homes. Early this month, Major General Ludwig Leinhos, a former director at NATO Headquarters Consultation, Command and Control Staff, said that cyberspace will likely be officially declared an operational warzone at the upcoming NATO summit in Poland this July. Wow! According to General Leinhos, all 28 NATO member...

Read More
domino effect is comparable to a ransomware attack

10 Jun Another Ransomware Attack, Cheap and Effective

Fleecing hospitals was only the beginning, now cybercriminals are coming for the universities. The University of Calgary is the latest victim of a ransomware attack —netting  nasty miscreants a ransom payout of $20,000. The University of Calgary is a leading research university. It is ranked one of the top 10 research universities in the country—housing 73 Canada Research Chairs, with more than 80 research institutes and...

Read More
Information security goals often do not align with IT executive ideals

08 Jun Reality vs Information Security Goals of IT Execs

I just read a new and interesting report from LTM Research that highlights the big gap between information security goals of IT executives and what is really happening in their organizations. IT executives want to detect serious cyber security incidents within a single day, but data shows traditional security solutions don’t usually detect a breach for months – if at all. The...

Read More
Top 5 things in security to tick off your CEO

07 Jun Top 5 CEO “Tick Offs” In Security

The majority of “Top Lists” in security focus on what the C-Suite does wrong or something along those lines. Today I present to you my Top List of what security people do wrong. Please note this is strictly my opinion based on 16 years’ experience in this field looking at it from the perspective of the U.S. Government, commercial enterprise,...

Read More
login credentials were easy for this celebrity hacker

07 Jun Celebrity Hacker Proves It’s Easy to Get Login Credentials

The Romanian cyber criminal known as the “Celebrity Hacker” revealed how easy it is to obtain login credentials –and his long list of successful hacks proves that his simple methods work. Login Credentials are Easy Guesses Marcel Lehel Lazar, who broke into the accounts of numerous celebrities, politicians, and government officials recently plead guilty in a U.S. District Court to charges of...

Read More
security training

03 Jun Security Training Helps, But it’s Not Enough

Industry experts agree that the actions of employees and other insiders are major contributors to data security incidents. Security training helps, but studies show it’s not very effective. Ponemon Institute recently released a report on “Managing Insider Risk through Training & Culture." The study examined enterprises that already have security and data protection training in place, and measured the effectiveness of those programs. Security training...

Read More
penetration test Part 2

31 May How IT Staff Can Make a Professional Internal Penetration Test —Part 2

As I mentioned in Part 1, penetration testing isn't just for hackers and security professionals. If you know how your infrastructure technology works to a protocol level then you can test it fairly properly. That means any IT staff member could be making their own internal penetration tests. As you get more comfortable doing these tests, you may be interested in...

Read More