What Will It Take for Some to Pay More Attention to Cybersecurity?

We have  had some challenging situations in Cybersecurity in the last 2 years (2014-15), But since we are so focused on the here and now, if it is not happening to you does it really affect you? Let’s review a few of the most egregious offenders and the problems they had:   Target¹ – malware on Point … Read more

Is Your IT System Low Hanging Fruit For Criminal Hackers?

A couple of questions come mind:  How can the Criminal Hacker tell if my system is weak and thus “Low hanging fruit” What will the criminal hacker do with my systems? How much do you REALLY trust your situation? Criminals have ways of finding your weaknesses – if you have one they will find it. … Read more

What To Look For In Logs: Hackers Being Successful

Today there was an interesting VISA BlackPOS informational webinar today. What I got out of it is some more information to make sure and keep in mind these items when looking for Indicators of Compromise(IOC). VISA¹ has a great program to help small businesses protect themselves against cyber attacks There were a lot of good … Read more

If Offense Has Advantage We Must Analyze Logs Better

If  the theory says that Offense will always find a way into your environment (somehow) with  a mistake or just better attacks then we must get better at developing Logs and react to attacks as fast as we can. This interesting and well thought out guide from Crest-approved.org¹ discusses what should be done in the … Read more