Risk management Failed Us!
Why you say? We can review our systems that we have and assign a higher risk on some systems depending on the value of the data, it’s function etc. So…
Defend Your Systems
Why you say? We can review our systems that we have and assign a higher risk on some systems depending on the value of the data, it’s function etc. So…
2014 was the “Year of the Breach” they say with the usual credit card breaches: Home Depot, Target and more… The clincher was the ultimate attack with Sony corp that…
Computerworld has the story: http://www.computerworld.com/article/2878741/hacker-hijacks-wireless-foscam-baby-monitor-talks-and-freaks-out-nanny.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_all We have posted about this before Jun11, 2014 http://oversitesentry.com/what-if-your-new-gadget-gets-hacked-even-your-countertop-or-toilet/ The creepy hacker said some words to the nanny and caused the nanny to turn off…
What does Dox mean? http://www.urbandictionary.com/define.php?term=dox defines dox as personal information about people on Internet, including real name, known aliases, address, phone number, SS#, cc#, etc. So if you think you…