Criminal Hackers Will Find Your Weaknesses

Criminal tattoos – these are the guys attacking us.  The Criminals have multitude of tools at their disposal, just like anybody with technical aptitude does. And just like water flows and creates new channels as it runs downhill the hacker will find your weakness. Because the Hacker Economy is now in the hundreds of millions … Read more

Why Do Constant Vulnerability Analysis?

What can we do to shore up our defenses? If you already have a firewall, an IDS/IPS, an anti-virus software.  Is that all there is to make your network as close to impervious as possible?   I.e. the six sigma security that I have discussed in past blogposts: http://oversitesentry.com/assume-you-are-hacked-so-get-6-sigma-security/ How to test your environment? – … Read more

DARKNET- Know it – Learn it

 also called the “Deepweb” Guess what the IRS was hacked, which actually means we were hacked. http://arstechnica.com/security/2015/05/report-irs-admits-its-been-hacked-tax-info-stolen-for-100000-plus/ In the thousands of breaches all over the world, the criminals are building a dossier data file on all of us that have any PII – Personal Identifiable Information. Addresses (old and new), answers to questions like what … Read more

Memorial Day 2015 Thoughts

http://www.wsj.com/articles/SB118014402282815483 An excellent tribute and a very good expanation in 2007 Memorial Day and today 8 years later:   Once we knew who and what to honor on Memorial Day: those who had given all their tomorrows, as was said of the men who stormed the beaches of Normandy, for our todays. But in a … Read more

3 MUST DO in #Cybersecurity

We have all heard or seen the headlines Sony gets hacked, Home Depot Credit Card processing stolen, Target credit Card processing stolen, and more and more companies are all getting hacked. So big deal you say how did that happen? Yes, most of the reason breaches occur is a human employee clicks on spam or … Read more