This morning’s WSJ on page A3 really boiled my blood. In the article, “Hacker Sentences Pose Test for Judges,” the WSJ reported on the Latvian hacker convicted for a part in the Gozi virus. The Gozi virus was one which … Continue reading
Ted Lloyd
In a previous post, I commented on the insider threat as an area often overlooked, particularly in smaller enterprises. Two variations of the insider threat were discussed: (1) the insider out for financial gain, and (2) those intent on settling … Continue reading
After reading yet another headline about cybercrime, you have decided to go out and purchase cyber liability insurance. Are you protected? The answer is “it depends.” First of all, cyber liability insurance is only going to protect your business against … Continue reading
Having breakfast this morning with an acquaintance, the topic of egress filtering came up and hence the inspiration for this post. Just about any business these days, regardless of how small, deploys a network firewall. Even sole proprietorships and home … Continue reading
Reading the front page of this morning’s IBD, staring me right in the face was an article on forcing industry to give the government keys to decrypt customer information. While a knee jerk reaction to the Paris terrorist attacks this … Continue reading
This last week’s news that Starwood reported a breach affecting 54 of their locations is a continuation of an unsettling trend of detection gaps where organizations often take months to discover that they have been hacked. In this case, the … Continue reading
The cybersecurity profession, like many other professional disciplines requires annual continuing education. Yesterday, working to complete the needed hours for this year, I attended an all-day seminar sponsored by ISACA. The attendees were all security professionals, some operational and most … Continue reading
Some time back, I blogged about the true intent of a denial of service attack, (DDoS). In that post I discussed that the true intent of a DDoS attack is usually to create a distraction, forcing the IT staff to … Continue reading
Headlines can be found on a daily basis reporting increased cybercrime. While larger businesses are better funded protecting themselves, the small business market is undeserved by the large security vendors. Worse, with the cyber security business bringing in billions in … Continue reading
Over $1.2 billion stolen by thieves using email scams in last two years according to the FBI. Financial fraud easily targets stolen email accounts with 50% of SPAM email containing malware. Smaller firms have less technical and security resources resulting … Continue reading