IT Security is a Mindset

Here is a picture of a lock, since everyone has one (the above is a picture of a hotel lock).  We don’t buy a house with a Door that has no lock.   The lock cost is not high compared to the other items in the house, including land, wood structure, electric lines, and more. … Read more

Can the Cloud “Fix” Your Security Risks?

A nice article at Network World about how Milwaukee Tool used the “Cloud” to remake a significant part of the company (product development collaboration). (I like that picture) So we know the Cloud can help with multi-nation or multi-state collaboration efforts. The cloud can help with Application Development (not just tool product development) as well, … Read more

Hackers Find Ways to Attack

It seems to me there is a large disconnect of how a hacker does their work. There are lot of youtube videos with hackers showing how they have hacked something. How can hackers seemingly get in complicated defenses? (not all hackers are criminal in nature)   The following shows some of the combinations within a … Read more

Criminal Hackers Will Find Your Weaknesses

Criminal tattoos – these are the guys attacking us.  The Criminals have multitude of tools at their disposal, just like anybody with technical aptitude does. And just like water flows and creates new channels as it runs downhill the hacker will find your weakness. Because the Hacker Economy is now in the hundreds of millions … Read more