Just Don’t Post It

keep_your_pants_onIt’s in the news right now, if it’s not a national politician posting suggestive tweets then it’s a PR Company destroying a high-dollar national account. Social media, blogs, tweets, wall posts – they can be wonderful tools to connect with new friends or build new business relationships and with one click of the mouse, they can turn into an ulcer forming, nightmare inducing, brand busting mess.

Continue reading Just Don’t Post It

Facebooktwitterredditpinterestlinkedinmail

Phishing

Hook, line and bait – no we’re not fishing, we’re phishing. This cyberattack is a form of social engendering. Sometimes the attacker approaches you via a telephone call, other times it’s via e-mail, sometimes the attacker is bold enough to even show up in person. This is one of the most preventable attacks out there, but time and again we see our neighbors caught on someone’s hook.

Continue reading Phishing

Facebooktwitterredditpinterestlinkedinmail

Malware

Six of the top fifteen threats in 2010 were from Malware. These vicious little programs are designed to do everything from breaking security protocols to logging the keys that your users are typing. In the “2011 Data Breach Investigations Report” as published by the Verizon RISK Team in cooperation with the U.S. Secret Service and the Dutch High Tech Crime Unit; the top two threats were both malware, the top threat was designed to forward data from your secured network and send it to a third party while the very close second level threat was created to allow a nefarious person to remotely access and control your computers.

Continue reading Malware

Facebooktwitterredditpinterestlinkedinmail

Researching ways to improve scientist's access to data. Programming software to solve humanity's problems. Disseminating emergency preparedness knowledge. Sharing knowledge about science. Practicing amateur radio. Serving humanity through volunteer efforts.