Retribution…Proportional response…these are simple phrases intended to calm the masses and justify actions. Many times these phrases are both necessary and warranted. In today’s case, my fears are fueled by the nature of diplomatic “one-upsmanship” that can take place in this scenario. Russia does not view the score as now even. Round two and three and four are coming. Be prepared!
Month: December 2016
Krebs – Holiday Inn Parent IHG Probes Breach Claims
Beware of this most recent potential card breach associated with a large hotel organization.
https://krebsonsecurity.com/2016/12/holiday-inn-parent-ihg-probes-breach-claims/
Threatpost 2016 Year in Review
ESET – What is encryption and how does it work?
This is a fun little video providing a beginners introduction to encryption and how it works. Enjoy!
http://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/
Sophos Weekly Recap – The Last of 2016
You Need To Know The Top 10 IT Security Trends For 2017
This is an interesting list from the team at KnowBe4. Clearly, they are self-promoting, but there is truth in the need for enhanced user awareness training at every level.
https://blog.knowbe4.com/you-need-to-know-the-top-10-it-security-trends-for-2017
Sing a song of ransomware…
Here is a fun little ransomware inspired ditty to get you in the holiday spirit!
https://nakedsecurity.sophos.com/2016/12/22/sing-a-song-of-ransomware/
Healthcare Breaches Spike 63% in 2016
This is certainly a disturbing trend and points to where our focus should be as we enter 2017.
http://www.infosecurity-magazine.com/news/healthcare-breaches-spike-63-in/
Sophos – Our 12 tips for staying safe online this Christmas
Here is some great advice as you navigate all of the cyber security related challenges of the Christmas season. Enjoy!
https://nakedsecurity.sophos.com/2016/12/21/our-12-tips-for-staying-safe-online-this-christmas/
WAN Complexity Hampers Security for Orgs
This article is quite true. And frankly, this level of complexity is not necessary. It is often a bi-product of organizations attempting to save money through ad hoc changes and extending equipment usage beyond planned or recommended levels.
http://www.infosecurity-magazine.com/news/wan-complexity-hampers-security/