Tag Archives: information security

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against

Mark Zuckerberg’s Accounts Compromised

Facebook founder, Mark ‘Zuck’ had his Twitter and Pinterest accounts compromised after the LinkedIn data breach that happened back in 2012, through the recent sale of the emerged data. It’s proof positive that one must diversify usernames and passwords, close … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mark Zuckerberg’s Accounts Compromised

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

USB Compromise Reveals 22,000 ISIS Identities

A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Compromise Reveals 22,000 ISIS Identities

Cybersecurity Bill of Rights Adopted by NAIC

On October 14th, 2015, the National Association of Insurance Commissioners (co-developer of the Model Audit Rule) has adopted the Cybersecurity Bill of Rights​ ​ The Cybersecurity Bill of Rights describes what you can expect from insurance companies, agents, and other … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Cybersecurity Bill of Rights Adopted by NAIC

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

19 Laws of Information Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 19 Laws of Information Security