Cybersecurity - Back to Basics
by Derek Boczenowski on June 14, 2019 at 1:00 PM
Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.
CIS Critical Security Controls V7.1 - What's New?
by Patrick Hughes on May 29, 2019 at 1:25 PM
The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …
5 Quick Tips To Help With Information Security
by Geoff Yeagley on November 29, 2016 at 1:30 PM
Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …
How to Secure WiFi in 5 Simple Steps
by Kyle Daun on November 21, 2016 at 10:15 AM
The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …
Ransomware Update: The FBI is Coming, The FBI is Coming...
by Geoff Yeagley on September 20, 2016 at 1:30 PM
Q: Why was the Computer so tired when it got home? A: Because it had a hard drive While the joke above is pretty funny (at least I thought it was), Ransomware is no joke. I have written several blog posts about Ransomware over the past 9 months and the dangers that these types of atta …
From Brute Force to the Phishing Email: How Hacking Has Changed
by Geoff Yeagley on September 15, 2016 at 2:35 PM
Hacking has changed. Both in how they do it and why they do it. Before, it was individuals trying to use brute force to gain entry into your network. It was aggressive and LOUD. Think of the idea of using a missile to swat a mosquito, same thing. Most of the time it was to prove a poi …