email security and cyber risk insurance htt
Breakfast Bytes
The dark side of smart cities, A clothing line designed to distract the panopticon, Geofencing warrants, and horror stories of hospital IN-security
Facial recognition, systems with Windows Defender compromised, and 11 recent security vulnerabilities highlight the necessity of viable network layer security strategy.
Security News
Additional Info:
FTC vs LabMD court case and what we can learn from it.
Security News: Legal liabilities of read receipts, VFEMail and data stores completely destroyed, Facebook storing passwords in cleartext, Why WPA3 is not secure either, and ASUS software updates install backdoors on thousa
NotPetya; the most devastating cyber attack in history.
Additional information:
Browser add-in NewsGuard
Communications Decency Act - Section 230
Privileged identity management
Failure of the one identity concept.
Virtual Patching, Telecom Fraud, Running VM Server on NAS
TruthFinder evaluation, SIM jacking, and Why SMS for multi-factory authentication is very risky.
Appliances versus real server hardware and video surveillance system design.
Server Hardware, Windows 10 and IPv6 requirement, Running a VM on a Synology NAS
Tech companies and their scoring system
Security Protocols and Ciphers- Educate yourself about the dangers of 5G radiation to human health
Totalitarian Surveillance
Dangers of 5G Radiation
Avoiding Identity Theft and Location Data Sharing
Website Security, how to keep your website secure and why it is necessary. TLS 1.3 impact for all end users of all browsers and what it means
How to avoid business email compromise scams
Part 2 of the Verizon data breach team's report analysis and related identity theft topics
Verizon Data Breach Investigations Report review.
Cloud hosted servers are usually a rip-off;Explanation of SaaS versus IaaS
Deprecated software follow-up, Examples of more VOIP providers and discussion about the security or lack thereof regarding their services, Amazon spy devices
Deprecated Software and Network Security Strategy
Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives
Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives
Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives
Security Predictions for 2018 - Spectre/Meltdown Fix How To
Security Predictions for 2018
10 Questions for Evaluating IT Firms - Debunked
Adobe Acrobat 11 - End of life and what to do about it, KRACK wireless vulnerability and what to do about it, and Mistakes with endpoint protection that costs you dearly
Adobe Acrobat 11 End of life, KRACK wireless vulnerability, and Mistakes with endpoint protection that costs dearly
IT Hardware Life Cycle
Advances in multifactor authentication, changes in Office 365, free cybersecurity tools
CyberSecurity Compliance Enforcement
VOIP Services: The good and the ugly.
Problems with Azure you need to be aware of
Learn from the mistakes of others in order to prevent being the victim of crimal fraud in IT.
Fileless Ransomware
Ransomware attack methods and prevention techniques
Petya Ransomware - Prevention and Recovery
The latest patch and security updates you need to know
Ransomware mitigation
2017 Verizon Data Breach Report Analysis - Part 4
2017 Verizon Data Breach Report Analysis - Part 3
2017 Verizon Data Breach Report Analysis - Part 2
2017 Verizon Data Breach Report Analysis - Part 1