Monthly Archives: May 2016

New Vehicles

Jaime and I got new vehicles today. Now Damien, Jaime, and I all have silver vehicles, pretty cool!

Posted in life | Comments Off on New Vehicles

360,213,024 Users Credentials… From MySpace?

If you re-use passwords and haven’t changed your login credentials from back when you used your MySpace page 10 years ago, then you are at risk! The login details of more than 360,213,024 MySpace accounts have been leaked on the … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on 360,213,024 Users Credentials… From MySpace?

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

Julie and Tyler’s Wedding

We attended Julie and Tyler’s wedding down in Yuma. It was a fun night! Damien got to visit his mom too.

Posted in life | Comments Off on Julie and Tyler’s Wedding

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

Smart Farming Vulnerabilities

Smart farming is a real thing, it enables farmers to monitor their crops and gather visual analytics on big data. This allows for farmers to anticipate crop availability and forecast pricing. This data is very valuable to the farmers and costly … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Smart Farming Vulnerabilities

PCI DSS Version 3.2

PCI DSS 3.2 is officially published Here is the summary: Multi-factor authentication will be required for all administrative access into the cardholder data environment. The “Designated Entities Supplemental Validation” (DESV) – a set of steps that tell an entity how they can … Continue reading

Posted in Security Blog | Tagged , | Comments Off on PCI DSS Version 3.2