One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers),…
Yes you should use password managers, long passwords over short complex as you see below’s XKCD famous image. we discussed in our blog oversitesentry before:…
Triple extortion Ransomware means that a good backup is not good enough anymore: https://rumble.com/vhaoeh-full-fixvirus-show-may19.html Because the data may be stolen and ransomed to patients/clients/ 3rd…
NSA insights video(7/18/18) gives an overview of what is happening in their Cybersecurity Threat Operations Center. The presentation explained when the Equifax hack happened…
Why? Once the criminal has hacked your computers they can sell the “access” to your devices. How can I say that? Kaspersky¹ and others have…
If you want to use the Internet then you must know now you are within arms length of all people with a computer in this…
The first thing that happens is we know that the IT personnel are working overtime and are still not keeping up with problems. How you…
As Robert Graham says in his blog Errata¹ It is Human nature to do a number of Cybersecurity No No including fall for Phishing scams…
Houston we have a problem – a kind of misunderstanding which leads to apathy. Example: I wonder if you knew this week a new ransomware…
One does not have to be on the cutting edge of technology to be secure. But, in my hacking classes (where we try to attack…