I’ve written articles about how cyber security is an afterthought of many of the products we use today which rely on some sort of security.… Read More
Blog Posts
If You Are A Programmer Do You Know Your OWASP – Top 10 ?
Many application programming groups never heard of OWASP which is a shame since many of today’s application vulnerabilities could be prevented.… Read More
What is the actual value of a CISO?
First let me start by saying I didn’t write this article nor have any influence on the author.… Read More
So you have been infected with Ransomware
Follow these steps to prevent further spread of ransomware on your system:
Disconnect infected system(s) to prevent further spread of malware Call your technical support staff immediately so they can determine what variant of ransomware you may have and take appropriate next stepsIf you don’t have technical support available or they are not versed in ransomware procedures please follow below:
System administrator should temporarily revoke your system network access rights to all shares Determine how large the infection is Determine what strain of ransomware infected machine Based on your findings, take the next steps in restoring data Remove ransomware from your infected systemHopefully you made backups of your data (if you didn’t it’s time to pay up and hope)
Restore Your Files From Backup
Locate your backups a.… Read MoreCyber Protection Steps For Smaller Buisnesses
Many smaller businesses I’ve spoken to over the last year don’t think Cyber Security is something they need to worry about until they call to say they may have had a breach and need help.… Read More
If you have a LinkedIn account should you change all your passwords ?
Those of us who have accounts on LinkedIn and received a breach notification, should you be changing passwords on your other systems if you used the same password as on LinkedIn ?… Read More
Why do hackers target smaller non Fortune 1000 businesses?
There is a misconception that small and medium sized businesses (SMB) are not int he cross-hairs of hackers. … Read More
Should you be accessing someone’s breached data?
I don’t profess to be a lawyer nor fully understand the intricacies of the legal system here in the US or abroad, but I have wondered for many years if access to stolen information such as the Panama Papers is legal.… Read More