Today’s hackers are yesterday’s gunslingers and should prompt our country into a more serious cybersecurity posture
Venture capitalists talk about an unfair competitive advantage. Business experts talks about leveling the playing field. And everyone else just talks about fair play. But when it comes to warfare everyone wants the unfair, overwhelming competitive advantage. For years the U.S. military has had this advantage with manpower, equipment, technology and strategies. But a simple change on the order of the invention of the Colt 45 pistol makes all of that moot.
Unlimited data plans offer convenience and cost-efficiency, but also provide a level of cybersecurity that wifi can’t match
If you’ve been anywhere near a TV or website in the last month you’ll know that every major cellular carrier has begun offering unlimited data plans. Depending on how many gigabytes are in your current plan the difference in your monthly bill could be as little as $10. But let’s call it $20 to cover a broader swath of users who are probably on a small data allocation.
This $20/month increase in expenses is an investment in your cybersecurity and in protecting you from hackers. Why? In a word: wifi.
(The Four Rs of Cybersecurity And How To Build A Culture Around Them)
‘Tis the season for making predictions. I love predictions. I love the crashing sound they make as they fall flat on their faces. They are very rarely right and wrong so often that it prompted Yogi Berra to say, “It’s tough to make predictions, especially about the future.”
One thing is for sure: Yogi was never in the cybersecurity business. How do I know? Because making predictions in the cybersecurity business is easy. Here’s mine:
The other day I had a fit of long-overdue reorganizing. Moving to a new office space will do that to you, I guess, but it’s a good opportunity to review, reassess and purge. In doing so I came across an old list that I had given to my wife just prior to a transatlantic trip; I figured that in today’s world you never know what craziness might ensue so better to err on the side of caution. Some people use the same password for every website (a VERY bad idea) and others use a different one that they make up and have to remember for each site (a better idea but too difficult to remember them all). Continue reading “The Only Three Passwords Your Survivors Will Ever Need”
Your company should have social media policy because social media changes what your employees can say, when and where they can say it. Here’s what I mean:
Dave is the kind of salesman that every company wants. Driven, slightly aggressive, persistent and a contact list a mile wide. He has lots of followers on his Facebook page and Twitter feed and is growing even more quickly on Pinterest, thanks to the photos of your company’s products that he posts.
When Dave closes a deal he takes the team out for beers, treats his family to a nice dinner out and brags about it on his social media accounts. Lots of people reply with congratulations or words of encouragement.
Amy, in your accounting department has a different social media presence that reflects her more reserved personality. She blogs regularly on Tumblr and posts selfies on Instagram while in pensive poses when problems overwhelm her. She doesn’t have as many followers as Dave, but the people who care about her have followers of their own and whatever she posts, they re-post, “like” or tweet about so many others see what Amy is thinking and feeling, too.
Both Dave and Amy represent major risks for your company.
Now phishing attacks have become personal. Very personal. And very frightening.
It’s hard to imagine that it’s come to this already. As if phishing attacks aren’t bad enough we’ve all been exposed to “spearphishing” attacks – which add a level of information that makes them more likely to get their victims to click on the link bait. Now we’ve got a highly sophisticated, very personalized and downright frightening form of phishing never seen before. Continue reading “Phishing Attacks Have Become Highly Sophisticated”
It’s bad enough when your login credentials are stolen from your favorite website, but it can be way, WAY worse when those credentials are for your Facebook or Google account.
People often ask my why it can be a total nightmare if your Facebook login is stolen. There are two reasons why.
First, these are what I like to call “gateway logins.” There’s another name for them in technical circles but the point is that many of these logins, such as those for Facebook, Google, Twitter and a couple of others can be used to login to many other sites.
What Is Ransomware And How To Avoid Being A Victim
Do you know the answer to this question: What Is Ransomware And How To Avoid Being A Victim?
If you think you’re not a target for a cyberattack recent “ransomware” incidents should make you think again.
What’s it like to be held hostage? I never want to find out and I’ll bet you don’t either. But given today’s environment executives might find themselves held hostage in a way they never expected. Ransomware, as it is known because it holds your entire computer system hostage, is quickly becoming the hacker’s method of choice because it’s simple, fast and virtually untraceable. Continue reading “What Is Ransomware And How To Avoid Being A Victim”
This patch, more than eight years overdue, could have prevented the MedStar Health Ransomware Attack
Some things just make you want to grind your teeth. Even after hospitals in California and Kentucky had been attacked during the last 30 days other health care companies didn’t do the obvious thing and examine their own cybersecurity measures to insure that the exact same thing didn’t happen to them. You really have to wonder: what are these people thinking… or NOT thinking?? And from a technical standpoint it makes you wonder: Can A Software Patch Prevent A Ransomware Attack? Continue reading “Can A Software Patch Prevent A Ransomware Attack?”
Cybersecurity Information for Board Directors and C-Level Executives In Partnership With BoardProspects.com
I am proud to make the following announcement regarding cybersecurity information for Board Directors:
BoardProspects.com, the online destination for recruitment for board members, prospective board members and corporations has teamed up with Scott Goldman, noted technology thought leader and cybersecurity patentee, to provide regular information and updates about cybersecurity issues tailored to the needs of Board Directors and C-Level executives. Mr. Goldman will be publishing a bi-weekly article for the website and responding to questions in online forums about how various cybersecurity threats and challenges affect Directors and how the latest hacks and intrusions could impact their companies. Continue reading “BoardProspects.com and Scott Goldman Team Up To Provide Cybersecurity Information for Board Directors”