The Enemy Has Say With Your Best Plans

In the field of Cybersecurity we have to do a lot of basic things: as discussed in Behavioralscientist.org So what is your plan?  Firewall, Antivirus, IT people vigilance, updating devices and software… What are your enemies’ plans? When your enemy actually interacts with your employees it  shows. There are always business level threats (where employees … Read more

Malware, Routers Injected, Stolen Identities, Just Another Cyberday

A few headlines in a day or 2 – are typical day at the Cybersecurity Office.   Verizon Routers command injection flaw could impact millions of routers. High Severity flaw CVE=8.5. “The vulnerabilities exist in the API backend of the Verizon Fios Quantum Gateway (G1100), which supports the administrative web interface.” Exodus Spyware attacking Apple … Read more

No Mas- Uncle!!! IT Departments Under Siege

We are inundated with constant headlines Thousands and sometimes millions of records stolen by hackers(the bad guys). In fact the worst breaches are health records as in this article at Forbes. “The number of annual health data breaches increased 70% to 344 over the past seven years, with 75% of the breached, lost, or stolen … Read more

Time For Security Major Effort?

I.e. Do we need to make a major research effort to solve all(or most) Cybersecurity problems? Why? Because mistakes keep happening: And these are not small mistakes – they may shift our world underneath us…  As California considers more legislation and Breach reporting requirements, other states may also look into this issue.  At Databreachtoday.com there … Read more

Is Compliance Enough for Your Company?

If you accept credit cards you need PCI compliance If you have health data then you need HIPAA compliance. A financial company gets many pieces of compliance which depends on what types of financial instruments you sell. You may need other types of compliance. Unfortunately PCI compliance does not require a backup of your critical … Read more