Tag Archives: Information Technology Security Awareness

Five Habits to be Unhackable

By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Five Habits to be Unhackable

Survey Says 80% of Security Risks are Users

Bromium surveyed 100 security professionals to see what they thought their biggest security risk was. Through my own research, I have found that the best way to give security awareness training, is NOT this way, with one time security awareness … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Survey Says 80% of Security Risks are Users

SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China

The FBI was brought in to investigate The Scoular Company after the controller wired $17.2 million dollars to China through their accounting firm, KPMG. There were emails to the controller from an email address that resembled but was not the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China

Game of Hacks

Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.

Posted in Security Blog | Tagged , , , , , | Comments Off on Game of Hacks

Worst Passwords of 2014

An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Worst Passwords of 2014

Presidential Proposal List

As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Presidential Proposal List

Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

This was in the news yesterday, it is proof that social engineering is the master key to unlock many locks. It is also proof that to keep your lock secured, security awareness and training is needed with the end goal … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

Protecting Personal Information

Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Protecting Personal Information

Stealing Biometrics & Bypassing Authentication

Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Stealing Biometrics & Bypassing Authentication

Basic Computer Security

There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. 1. Install security software: There is a lot of security software available and most well … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Basic Computer Security