Monthly Archives: May 2018

Trends 2018: Critical infrastructure attacks on the rise

Cyberthreats to critical infrastructure jumped into the headlines in 2017, starting with a Reuters report in January that a recent power outage in Ukraine “was a cyber-attack”. In last year’s Trends report we said that we expected infrastructure attacks to “continue to generate headlines and disrupt lives in 2017”. Sadly, we were right, and unfortunately, I have [...]

By |2018-05-30T19:27:06+00:00May 30th, 2018|Uncategorized|0 Comments

5-year-old IoT attack resurfaces, puts millions of devices at risk   Update: Z-Wave reached out in response and provided additional details about Z-Shave. Most critically, according to Raoul Wijgergangs, VP/GM of Z-Wave for Silicon Labs, and Lars Lydersen, senior director of product security, Silicon Labs, is that the vulnerability can't be forced from outside a Z-Wave IoT network, and the window to take advantage of [...]

By |2018-05-29T13:16:40+00:00May 29th, 2018|Uncategorized|0 Comments

GDPR: One rule to rule them all – legally

There is a certain similarity between J. R. R. Tolkien’s The Lord of the Rings trilogy and General Data Protection Regulation (GDPR) coming to force tomorrow, May 25 2018. As weird as it may sound, the regulation puts in place standards identical to those of the One Ring – GDPR is here to rule the world of data protection [...]

By |2018-05-25T18:17:02+00:00May 25th, 2018|Uncategorized|0 Comments

How to use the Linux watch command for easier output tracking   There are times when you have to execute a command repeatedly. Let's say you've noticed some odd behavior on a Linux server and you think it might be related to either memory usage or I/O on a server, or maybe you want to monitor changes made within a directory. Thanks to a handy [...]

By |2018-05-23T17:15:02+00:00May 23rd, 2018|Uncategorized|0 Comments

3 reasons to start using SSL certificates right now   For many end users, SSL is most commonly associated with the act of online shopping. Particularly the small padlock that appears while attempting to checkout the items stored in your digital shopping cart. For others, the prefix https found in the address bar signals to them that, in fact, their information is being [...]

By |2018-05-22T01:16:48+00:00May 21st, 2018|Uncategorized|0 Comments

4 tips for making data cleanup easier and more efficient   Dirty data costs the US economy up to $3.1 trillion a year and organizations have been trying to deal with it by using methods like deduplication, normalization, or even removing or correcting broken or incomplete pieces of data by hand. There are tools that do this, but there are also times when manual data correction [...]

By |2018-05-18T16:01:09+00:00May 18th, 2018|Uncategorized|0 Comments

Seven out of ten see criminal hacking as big risk to health, safety, prosperity

Do criminals hacking into computer systems pose a risk to your health, safety, or prosperity? If you ask US adults this question, the answer is likely to be a resounding yes! Last month we put this question to 750 people and gave them four possible answers: Little or no risk; Moderate risk; Serious risk; and [...]

By |2018-05-16T13:41:25+00:00May 16th, 2018|Uncategorized|0 Comments

Critical PGP vulnerability could reveal text of your encrypted business emails

The vulnerability, called EFAIL, is exploitable against encrypted email, including previously transmitted mail, according to researchers. By James Sanders  | May 14, 2018, 5:45 AM PST   Critical unpatched vulnerabilities in widely-used email encryption tools PGP and S/MIME have been discovered by a team led by Sebastian Schinzel, professor of Computer Security at the Münster University of [...]

By |2018-05-14T13:59:42+00:00May 14th, 2018|Uncategorized|0 Comments

A well-trained staff may be your best defense against IoT cyberattacks

Protecting all your IoT devices from criminals requires more than mere technology. Every employee must be security aware and trained on what do to when attacks occur. According to Symantec's 2018 Internet Security Threat Report (ISTR), the total number of Internet of Things (IoT) attacks grew 600% between 2016 and 2017. Increasingly, criminals are using these [...]

By |2018-05-09T18:46:53+00:00May 9th, 2018|Uncategorized|0 Comments

To save thousands on GDPR compliance, some companies are blocking all EU users

To ensure compliance with the EU's upcoming General Data Protection Regulation (GDPR), companies such as GDPR Shield are offering tools for blocking EU users altogether. By James Sanders  | May 7, 2018, 6:50 AM PST With the General Data Protection Regulation (GDPR) set to go into effect on May 25th, 2018, many organizations are scrambling to ensure [...]

By |2018-05-07T15:52:30+00:00May 7th, 2018|Uncategorized|0 Comments