Attack versus Defense – What is Status?

It is September 5th, 2022  and probably as good a time as any to re-evaluate where we are with a general Attack versus Defense analysis: Attackers:  Only need to find one problem in defense to overcome and take advantage of to breach a system or network. Once the system is found that can be overtaken … Read more

Cybersecurity in Travel: Reducing Risk on the Road

What do hotels and travel have to do with cybersecurity? Firstly when you’re out of home base, the profile of what you do online is different. Similar to home cybersecurity and office cybersecurity is different. When you are away from home what happens? You don’t have control over the network , WiFi  or other connections. … Read more

Is Ransomware Like Lightning? Does it hit same site 2x?

lightning like ransomware?

The Myth of Lightning not striking the same place  again and again should be broken by now as in tomorrow.io post: What about ransomware, does it hit in the same place twice? Unfortunately just like lightning can hit the same place twice especially if it is a Metal rod on top of a tall building, … Read more

We Need a CyberCrowd

I keep going to the same topics, since we have the same issues come up again and again. We have discussed the Psychology of  Security (all of these topics are also in my book “Too Late You’re Hacked”), in this blog before – just search for Psychology of Security and you will see the posts. … Read more

Top 5 Prevent Hacks

Patch your software and hardware    (portswigger article) Password management – Keep passwords locked    – 2FA MFA, Backup and test backups – social engineering – Phishing education  (CISA – Cybersecurity& Infrastructure Security AgencyTips)  Test your environment     Why did i give the patching/upgrade the highest importance, because a policy of upgrading can lead your environment … Read more