Here is a fun Halloween themed article with some sound myth busting advice. Enjoy!
As mobile devices continue to dominate our choice for Internet access, a significant increase in smartphone and tablet malware is inevitable. Along with this will come hijackings and botnet farming.
There are some very interesting stats in this article and, frankly, some painful truths. Our shift in mentality toward constant access and dependency on social media has weakened our overall security stance.
This article provides some sound advice for anyone setting up or revising a security awareness program.
This topic cannot come up enough. This issue cannot be addressed enough. The point cannot be made too often – End Users Need to be TRAINED!!!
IT Security professionals, network engineers and admins are looking for ways to tighten and strengthen every layer of the network to defend against threats. The end point has become ground zero for a variety of attacks, so as such the end point management, monitoring and control sector has experienced tremendous growth. These are some good questions to consider when evaluating products and developing a strategy.
Ransomware is far from dead. In fact, it seems to constantly cycle back in newer, more aggressive forms. Be diligent in your preparations. Have sound backups. Filter your DNS. Train your people.
This is an intriguing step by Senator Warner, and it poses several follow up questions. I am personally unsure how an ISP can govern the devices on the inside of any user’s home router or firewall. Obviously, from a technical perspective, certain outbound traffic from a home can be filtered, but it would be very difficult to determine the configuration or firmware version of the source device.
ISP’s, however, are capable of assisting in the fight against DOS and DDOS attacks, depending on the architecture of their infrastructure and the investments they are willing to make to build dynamic solutions for routing and “blackholing” malicious traffic.
I am glad to see this debate coming to the forefront and receiving some well-deserved attention. The answers, however, are not quite as clear as we would like them to be.
This is an interesting read into the why’s and why not’s of multi-factor authentication usage. Enjoy.