Several high profile security vulnerabilities were released in the last few days. Here's a quick rundown of the most relevant to our members.
Read MoreMost organizations leave their cyber security up to their system/network administrators and/or programmers. Unfortunately this often results in unpatched systems, disabled firewalls, weak passwords, little to no secure software, and other bad practices that make overloaded IT teams’ and hackers’ jobs easier.
Sadly having a dedicated technical security team is a luxury few organizations think they can afford.
Read MoreMany people already know how to recognize sketchy files - usually they show up as attachments in unsolicited emails and/or have suspect file extensions. Viruses commonly have the .exe extension although several other file extensions are risky like .com, .app, or .vb.
Read MoreYour password must be between 30 and 60 digits. It cannot contain a word from any known language, it must include at least 1 hieroglyph and 1 sanskrit digit. You must include Pi to 8 digits as well.
Read MoreNo forensics experts were hired to investigate this incident where a librarian with domain administrator access allegedly created another domain administrator account that was used to execute this hack. If true it reflects terribly on the university's network security.
Read MoreCyber security needs people desperately, so how does this happen? We need to create new talent, we need to create paths into the industry to fill these roles. These candidates need to answer these questions for themselves.
Read More