Social Engineering Attack Affect Can Be Reduced

How? With training and security policies. Create a security culture and train your employees with a Security Policy. Train the employees to ensure they understand the security policy Here is a page at Fixvirus.com that discusses how to start a security policy: Also at the US Chamber of Commerce Here is relevant text from Chamber … Read more

Ready for Quishing Attacks?

Quishing – the QR code that sends you to download bad stuff     Let’s go back to what is a QR code from digital.gov? QR codes (or Quick Response codes) are two-dimensional codes that you can scan with a smartphone. The code contains information, usually a site address, and once you scan it, the … Read more

How Did CCP Unit 61398 Hack Us?

why discuss now?    This is the FBI 5 Unit61398 From left, Chinese military officers Gu Chunhui, Huang Zhenyu, Sun Kailiang, Wang Dong, and Wen Xinyu indicted on cyber espionage charges. Above Wanted notices included to show this is not an aberration but a consistent policy by CCP. I have written about Chinese PLA (People’s … Read more

Top 3 items to focus on in Cybersecurity? Healthcare

What would be the Top 3 items to consistently work on so that cybersecurity does not have to be worried about. (Main image above is the Cottage Health systems picture back when they had a security issue   https://oversitesentry.com/health-records-breached-no-cyberinsurance-payout-why-stupidity/ May, 2015 post). I.e. if one works on these Top3 items then cybersecurity in general will be … Read more

Security Policy Can improve Cybersecurity

With a Security Policy one can improve Cybersecurity and thus be proactive in keeping attacks to a risk managed level. We interrupt your boring cybersecurity NEWS ……Breaking news…   The Moonwalk Malware Miracle April 1, 2025 In a bizarre twist of tech fate, a new strain of malware has swept across the internet, dubbed “RetroVirus-X.” … Read more