Ransomware Risk Close to 0%?

How can ransomware risk be close to 0%? I made a video on Rumble and Anchor (Spotify) Rumble Video: The video is using information from the NIST document NISTIR 8374 RANSOMWARE RISK MANAGEMENT:A CYBERSECURITY FRAMEWORK PROFILE Ransomware Risk Management Fundamentals  NIST document Cybersecurity disinformation – Platform disinformation –   If done right the ransomware risk … Read more

Ransomware Risk Management Fundamentals

Looking across the Internet for new stories and new events in this holiday season I look at the fundamentals, thus found the NIST Cybersecurity framework profile:Ransomware Risk Management Specifically the NIST.IR.8374 document From this document I have  grabbed 3 basic items which everyone should be aware of in the image as well as in text … Read more

Calendar Invite Phish Attack Also

I bumped intothis site  (Dresec)   latest post is “Phishing with Google calendar”   His first sentence is a disclaimer as he does not want other people to use the information to send phishing calendar invites. To him (and me) it is only designed to be a test within our organizations. Here is the sample … Read more

Attack versus Defense – What is Status?

It is September 5th, 2022  and probably as good a time as any to re-evaluate where we are with a general Attack versus Defense analysis: Attackers:  Only need to find one problem in defense to overcome and take advantage of to breach a system or network. Once the system is found that can be overtaken … Read more

Vishing Attacks on The Rise

What is Vishing? Voice phishing, also known as vishing, is the practice of eliciting information or attempting to influence action via the telephone.(from hhs.gov site) Recently, a large U.S. company fell victim to a cyber attack that leveraged sophisticated phishing techniques involving phone calls to gain access to the victim organization. Phishing campaigns continue to … Read more