CyberSimplified Podcast Series – The Delta Hack of 2017
Check Out My Latest Podcast
11. For I know the plans I have for you,” declares the Lord, “plans to prosper you and not to harm you, plans to give you hope and a future. 12. Then you will call on me and come and pray to me, and I will listen to you. 13. You will seek me and find me when you seek me with all your heart.
Jeremiah 29:11 New International Version (NIV)
Cyber Security Proficiency
Cloud Services Proficiency
Physical Security Proficiency
I write and curate articles for this site that I think may be helpful, educational and even some that are original works. I am also a publish author of a number of articles on different technology subjects, not just through my own website but through nationally know channels as well. I have also been quoted for numerous articles as a subject matter expert in the fields of Managed Services and Cloud Services.
In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target reach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses.
Kelly Sheridan Slideshows – Connect Directly Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Oversharing sensitive information Most people don’t think twice about the personal information they make publicly available. Social media accounts are “a treasure trove” of birthdates, education histories, […]
Stuxnet Name Origin The original name given by VirusBlokAda was “Rootkit.Tmphider”; Symantec however called it “W32.Temphid”, later changing to “W32.Stuxnet“. Its current nameis derived from a combination of some keywords in the software (“.stub” and “mrxnet.sys”). What is a Zero Day attack? A zero–day exploit is an attack that exploits a previously unknown security vulnerability. A zero–day attack is also sometimes defined as an attack that […]
IndigoVision announces a product release that allows users to maximize their security systems potential. This release includes the latest version of their Security Management Solution Control Center, a new cyber-security innovation CyberVigilant® in Camera, the Integra™ all in one device, and three additional products which strengthen their existing security offering. IndigoVision’s Control Center has long been regarded in the industry […]
Cyber Security: Small Business Guide (PDF Version) NCSC Glossary Cyber Security: Small Business Guide (Infographic) A summary of low cost, simple techniques that can improve cyber security within your organisation. This advice has been produced to help small businesses protect themselves from the most common cyber attacks. The 5 topics covered are easy […]
Steps to help you identify the most common phishing attacks. In a typical phishing attack, scammers send fake emails to thousands of people, asking for sensitive information (such as bank details), or containing links to bad websites. They might try to trick you into sending money, steal your details to sell on, or they may […]
5 things to keep in mind when using passwords. Your laptops, computers, tablets and smartphones will contain a lot of your own business-critical data, the personal information of your customers, and also details of the online accounts that you access. It is essential that this data is available to you, but not available to unauthorised […]
5 quick tips that can help keep your mobile devices (and the information stored on them) secure. Mobile technology is now an essential part of modern business, with more of our data being stored on tablets and smartphones. What’s more, these devices are now as powerful as traditional computers, and because they often leave the […]
5 free and easy-to-implement tips that can help prevent malware damaging your organisation. Malicious software (also known as ‘malware’) is software or web content that can harm your organisation, such as the recent WannaCry outbreak. The most well-known form of malware is viruses, which are self-copying programs that infect legitimate software. This section contains 5 free […]
5 things to consider when backing up your data. Think about how much you rely on your business-critical data, such as customer details, quotes, orders, and payment details. Now imagine how long you would be able to operate without them. All businesses, regardless of size, should take regular backups of their important data, and make sure […]
Both Sears and Delta Air Lines are facing the exposure of some of their customers’ credit card information, following a data breach at a mutual contractor. The company, a customer services operation called 7.ai, suffered the breach between Sept. 26 and Oct. 12 last year. It said in a statement that the incident “potentially [affected] […]
After a drastic decline in the volume of spam coming from the Necurs spambot observed by Check Point Telemetry in the past month, the infamous botnet is back once again and is spreading QuantLoader. Necurs, considered to be the world’s largest botnet, was used to distribute several malware families in the past, such as the […]