Who is ultimately financially responsible when a brach or denial-of-service occurs?
IT Security and analyst book recommendations "Countdown to Zero Day", "Everybody Lies", and "Man, Interrupted".
Even though Social Hacking might seem like a new dangerous method of breaking into a network, it’s actually one of the oldest methods of manipulation.
There are an endless number of devices that are connected to the Internet. But, are they secure or do they blow a gaping hole into your network?
Ransomware has grown in large part because of how good our security already is. HTTPS traffic is becoming more and more common.
Phishing attacks aren't slowing down. The rate and the sophistication are increasing.
Schools have student and parent information, financial records, and medical records on file. They are a plethora of personal identifiable information.
So instead of an attacker targeting a company directly, some simple social engineering would let the attacker go after partner companies.
How Michael Scott from the Office can be related to the topic of Network Security.
There are reports that the American Dental Association has sent out USB drives laced with malware.
IT Personnel are in-charge when it comes to the security of their network. Policies need to be implemented by trained personnel.
There is no silver bullet. Go slow and diligent and you will win the cyber security war.
Stopping ransomware requires education and several pieces of technology. There is no single silver bullet.
Organizations need to use secure messaging apps in order to ensure private electronic communications.
Schools should embrace the same security protocols as any medical organization. This is an ideal benchmark and compliance obligation for them to reach.
Network security is a moving target. There are new exploits every day, so you have to make sure you are staying on top of your own security.
Guest wireless poses a number of risks and privacy concerns. Beware of free wireless internet!