Breakfast Bytes

email security and cyber risk insurance  htt

The dark side of smart cities, A clothing line designed to distract the panopticon, Geofencing warrants, and horror stories of hospital IN-security

Facial recognition, systems with Windows Defender compromised, and 11 recent security vulnerabilities highlight the necessity of viable network layer security strategy.

 

Security News 

Additional Info: 

FTC vs LabMD court case and what we can learn from it.

Security News: Legal liabilities of read receipts, VFEMail and data stores completely destroyed, Facebook storing passwords in cleartext, Why WPA3 is not secure either, and ASUS software updates install backdoors on thousa

NotPetya; the most devastating cyber attack in history. 

 

Additional information:

Browser add-in NewsGuard

Communications Decency Act - Section 230
 

Privileged identity management

Failure of the one identity concept.

Virtual Patching, Telecom Fraud, Running VM Server on NAS

TruthFinder evaluation, SIM jacking, and Why SMS for multi-factory authentication is very risky.

Appliances versus real server hardware and video surveillance system design.

Server Hardware, Windows 10 and IPv6 requirement, Running a VM on a Synology NAS

Tech companies and their scoring system

Security Protocols and Ciphers- Educate yourself about the dangers of 5G radiation to human health

Totalitarian Surveillance

Dangers of 5G Radiation

Avoiding Identity Theft and Location Data Sharing

Website Security, how to keep your website secure and why it is necessary. TLS 1.3 impact for all end users of all browsers and what it means

How to avoid business email compromise scams

Part 2 of the Verizon data breach team's report analysis and related identity theft topics

Verizon Data Breach Investigations Report review.

Cloud hosted servers are usually a rip-off;Explanation of SaaS versus IaaS

Deprecated software follow-up, Examples of more VOIP providers and discussion about the security or lack thereof regarding their services, Amazon spy devices

Deprecated Software and Network Security Strategy

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives

Security Predictions for 2018 - Spectre/Meltdown Fix How To

Security Predictions for 2018

10 Questions for Evaluating IT Firms - Debunked

Adobe Acrobat 11 - End of life and what to do about it, KRACK wireless vulnerability and what to do about it, and Mistakes with endpoint protection that costs you dearly

Adobe Acrobat 11 End of life, KRACK wireless vulnerability, and Mistakes with endpoint protection that costs dearly

IT Hardware Life Cycle 

Advances in multifactor authentication, changes in Office 365, free cybersecurity tools

CyberSecurity Compliance Enforcement

VOIP Services: The good and the ugly. 

Problems with Azure you need to be aware of 

Learn from the mistakes of others in order to prevent being the victim of crimal fraud in IT.

Fileless Ransomware

Ransomware attack methods and prevention techniques

Petya Ransomware - Prevention and Recovery 

The latest patch and security updates you need to know

Ransomware mitigation 

2017 Verizon Data Breach Report Analysis - Part 4

2017 Verizon Data Breach Report Analysis - Part 3

2017 Verizon Data Breach Report Analysis - Part 2

2017 Verizon Data Breach Report Analysis - Part 1