Social Engineering isn’t a new field of engineering. It’s a common thread in nearly all cyber attacks and something all employees – and everyone in general – need to be aware of. Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. […]
90 Days: A CISO’s Journey to Impact – Define Your Role
For those who are new to the role of Chief Information Security Officer (CISO) or want to learn what a CISO does and whether your company should have one, 90 Days: A CISO’s Journey to Impact: Define Your Role is an excellent short-read introduction. The CISO position has become critical to all organizations’ success. The book […]
CYBER TIP: Mobile Security
While you take precautions to protect your laptop, router, and even the Internet of Things, don’t forget to protect your smartphone, too. Today’s phones are much more than devices for making calls. It’s a GPS, a camera, a method to watch videos or play games. But don’t forget all the sensitive information that you can […]
Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?
After so much talk about the media the last few years, have you thought about what would happen if it weren’t available? While there are definitely people who would think that would be heaven, the recent cyber attack on the Australian news channel is a glimpse into what it means. In this case, the news […]
Cyber Security is a process, not a product.
Cyber Security is a process, not a product. That is, your company must be continually protected from cyber attacks. Think video versus photograph. The first step in a cyber security program is to assess where your organization is in protecting its information technology. That is the photograph. A snapshot in time. But knowing what’s wrong […]
City of Frankfort has IT network hacked
It isn’t a surprise that another local government has been the victim of a cyber attack. It happens much too often. As we talked about last week with the Kroger breach as a result of using Accellion file transfer software, we are almost becoming accustomed to it. Almost. While Frankfort city officials are being careful […]