No Good Deed… Apple 2FA Case Dismissed by California Federal Court

A few years ago, Apple began pushing “two-factor” authentication on its users.  Through an update in the Operating System, they began to require those who wanted to download and install software to, in addition to providing a password, use a separate out-of-band authentication mechanism. While such 2FA systems are not perfect, and those which rely…

Details

Managing Risk in the Era of Pandemic

Cyber Security is NOT about cybersecurity. It’s not about compliance with regulations. At the end of the day, cyber security is about identifying and managing risks. Risks associated with the use and misuse of technology. Risks associated with failing to protect data. Risks associated with doing too little. And risks associated with doing too much.…

Details

DR/BCP – TL:DR – Preparing for the Wrong Disaster is Better than Not Preparing At All

In the wake of the SARS CoViD-19 pandemic, news organizations have been interviewing so-called “preppers” – survivalists who have been preparing for some natural or man-made disaster by hoarding shelf-stabilized food, guns, underground bunkers, water, and backup electricity. The preppers are taking a victory lap essentially saying, “we told you so.” Not quite. You see,…

Details

Data Security for Telecommuters

The first day was like a snow day. Maybe sleep in late. Maybe handle a few hundred e-mails and phone calls. It was either very hectic, or very slow. It was anything but normal. By day three it has already gotten old. You’re not really into the telecommuting routine. You’re not quite “at home” but…

Details

COVID-19 and the Spread of Personal Information

Important News about COVID-19! That e-mail came from the Virginia EZ-Pass. In the past two weeks, if you are anything like me, you have been receiving hundreds of e-mails from vendors, suppliers, and third parties from Outback steak house to 1-800-CONTACTS telling you about their policies, plans or procedures for the coming zombie apocalypse that…

Details

My CORONA (Virus) – How To Survive With IT

In the wake of the COVID-19 pandemic companies are increasingly calling on employees to work from home. Hospitals, clinics, and doctor’s offices are preparing for massive infections, not only of patients but of healthcare workers. Colleges and Universities are sending students home en masse. Sporting events are considering playing in empty arenas. Airlines and other…

Details

Ransomware Response — A Better Way

On March 15, 2020, during the height of the COVID-19 pandemic, hackers attacked the Department of Health and Human Services (HHS) servers. In the past, computers belonging to hospitals, doctor’s offices, and other medical providers have been a particular target for ransomware purveyors who lock computers or files and demand the immediate payment of ransom…

Details

Cloud Range Lauded for Importance, Innovation and Ease of Use

CISOs Laud Vendor for Importance to the Business, Innovation and Ease of Use Security Current, the premier CISO knowledge-sharing community, today announced that more than 20 CISOs from across industries selected next-generation virtual cyber range and security operations simulation provider Cloud Range as the winner of the Security Shark Tank® during RSA 2020. In the…

Details

Flashback: Read this article on assessing whether your business can survive a pandemic written in Dec 2014 by Farhaad Nero who was VP of Enterprise Security at Bank of Tokyo-Mitsubishi at that time

Take the Test: Today Ebola, Tomorrow Who Knows? Can Your Business Survive a Pandemic? Read this article on assessing whether your business can survive a pandemic written in Dec 2014 by Farhaad Nero who was VP of Enterprise Security at Bank of Tokyo-Mitsubishi at that time   Pandemics are epidemics occurring on a scale that crosses international…

Details