So what is Zero Trust? In college, I worked at a bank when I came home for holidays or the summer. I was a rotating teller, so I was always at different branches. Once, an elderly gentleman came to my window to cash a check. I greeted him nicely and asked for his identification to […]
“Legacy” – The Good, the Bad, and the Ugly
What do you think of when you hear the word “Legacy”? The Good – “Legacy” is what others will picture when they hear your name after you’re gone. You might want your legacy to be that you were a family man and cared for your community. Or maybe you were a devoted wife and mother. […]
Lions and Tigers and Bears…OH MY!!!!
Is nothing sacred anymore? Now, the Louisville Zoo membership information has been breached! A third-party vendor that the Louisville Zoo uses to send out emails to its patrons was hacked. This is an example of a supply chain cyber attack. (That is when a vendor/partner has legitimate access to a client’s information systems, and a […]
So, What is a “Vertical Personnel Transportation Conveyance”?
When I worked at the Washington Navy Yard in DC, I noticed one day in the elevator that the inspection certificate above the floor buttons said “vertical personnel transportation conveyance.” The other people in the elevator (conveyance) must have thought I had lost my mind when I started laughing out loud. I thought about yelling, […]
Why do I Need a Vulnerability Scan?
Relax… A vulnerability scan or penetration tests (PenTests) don’t hurt. There’s no “prep” like with a colonoscopy. But they are just as important. Sometimes, people want to skip the vulnerability scan and add on their security controls (e.g., Endpoint Detection and Response, Network Monitoring, Firewall, Anti-Virus, etc.).Sometimes, they think they are protected since they already […]
Not Another Scam🙄
Not Another Scam… Yep, we don’t have enough to worry about, I guess. Isn’t there enough danger out there already? We must be careful of ransomware attacks, business email compromises, malware, phishing emails, vishing (voice phishing by phone), and smishing (phishing by text message). We have to protect our passwords, use multi-factor authentication, use different […]