How Can You Test Your Network? Safely-Legally?

Let’s assume that you agree that some sort of testing of your computers/network is required or should be done.   How should you test your network? There are daily scans coming onto all ip addresses on the Internet. This is a fact of life.  What is going on? We have talked about this before: http://oversitesentry.com/how-many-scans-are-attacking-the-internet/ {Most … Read more

How much should I spend on Cybersecurity?

I want to discuss 2 articles and then answer the question on the title. http://www.theguardian.com/small-business-network/2015/mar/24/hackers-cyberwar-businesses-cybercrime {Hackers are winning the cyberwar and businesses are all too often simply hoping for the best, according to many security experts. } Cost of Cybercrime in UK is £18-27bn … supposedly.  This could actually be low, since many people do not … Read more

Value of a Hacked Website

http://blog.sucuri.net/   has an interesting post about “The Impacts of a Hacked Website” This is a good line:   “We are learning the hard way, what large organizations already learned – being online is a responsibility and will eventually cost you something.” I now know that it was the Yoast  Google Analytics plug-in that caused … Read more

PCI Compliance is not Computer Security

PCI compliance has the basic settings for computer security but it will not ensure your corporation will be secure. For that to happen you must have personnel that implement security policies correctly, and it must be ingrained in all employees, as the weakest link is in our employee actions day after day.  It is difficult … Read more

Why Risk Management Model Failed Us

  Why has Risk Management  failed us? Every place you see “Accept risks” replace with Hacked computers.  JP Morgan proved this concept even with a seeming unlimited security and IT budget, some mistakes creep into the organization. 76 million accounts affected Every box with monitor and manage risks replace with Computer hacked from the internal … Read more