Before you buy or connect a smart device (IoT), read this!

Posted by:

The Internet of Things (IoT), as a term, has been bandied around a lot over the last few years.

Many people – even those that work in the technology sector – are still unclear on what IoT really means.

In this blog series, we will define IoT, talk about why infosecurity experts are concerned, and delve into some of the issues facing both providers and consumers.

We’ll also provide some practical recommendations for both parties:

  • Consumers of IoT devices: Tips for choosing the right IoT ...
Read More →
1

We’ve all got password fatigue, but are NIST’s new policies wise?

Posted by:

Ah the necessary evil of passwords.

Those of us who have worked in organizations that require users to change passwords at set intervals know what I mean.

Typically every three to six months, users are requested to perform a password change – maybe in the form of an annoying pop-up alert. In some setups, the user is lock out of the system until a new memorable password (but one that follows the complex password creation guidelines) is set.

A ...

Read More →
0

Everything You Need To Know About WannaCry – Right Now

Posted by:

What is WannaCry?

WannaCrypt, aka WanaCrypt0r 2.0, WannaCry and WCry, is a new ransomware that hit over 74 countries in the last 24 hours, which spreads like a worm by leveraging a Windows vulnerability (MS17-010) that has been previously fixed by Microsoft in March of this year.  WannaCry is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that makes them unavailable to you anymore.

The express train speed with ...

Read More →
0

TBG Security secures top placement in the Palmetto Cyber Defense Competition

Posted by:

Earlier this month, TBG Security took part in the The Palmetto Cyber Defense Competition (PCDC).

PCDC is a three-day cyber defense competition created through the collaboration of two organizations: the Space and Naval Warfare Systems Center Atlantic (SPAWAR) and the South Carolina Lowcountry Chapter of the Armed Forces Communications and Electronics Association (AFCEA).

Designed to energize high school and college students about an exciting future in the cybersecurity ...

Read More →
0

Addressing the PEBCAK scenario: protecting systems against rogue employees (PART 2)

Posted by:

malicious employeeIn the PART 1, we discussed how non-malicious employees can disrupt business continuity. This post will focus on the malicious or rogue employee and outline what you can do to obstruct an inside job.

First off, many wonder just how big of a problem is posed by rogue employees? Take a look at these recent ...

Read More →
0

The PEBCAK scenario: securing systems against non-malicious employees

Posted by:

Ever use the expression PEBCAK? What about ID-Ten-T error?*

While many variations exist, they all mean the same thing: user error. Ignoring the negative sentiment implied, it’s effectively a shorthand to say, “not our fault.”

In the world of, say, technical support, perhaps this expression might be acceptable. Many tech support teams exist simply to ensure their widgets are functioning correctly. But when an IT representative uses such terms to refer to a user within the organization, shouldn’t it raise a red ...

Read More →
1

3 of 4 Companies Experience Internal Information Security Incidents

Posted by:

Insider hacking

How much do you trust your employees? Would you bet your company on it?

Wiling to beyCostly cyberattacks are now almost routine for businesses, but while many organizations are focusing on external attackers, its important to also look at threats from within. According to the IT Security Risks Survey conducted by Kaspersky Lab and B2B International, 73% of companies have been affected by ...

Read More →
0

Hackers Steal Trading Algorithms From Hedge Funds

Posted by:

Read More →
0

New Cybersecurity Exam Process For New York Banks

Posted by:

cybersecurity examsSuperintendent of the Department of Financial Services (NYDFS) Benjamin M. Lawsky announced in a memorandum, adding to the banks’ compliance obligations, effective immediately, banks chartered or licensed in New York will now face an updated cybersecurity examination process.   “The Department encourages all institutions to view cybersecurity as an integral aspect of their overall risk management strategy, rather than solely as a subset of information technology,” Lawsky wrote. Additions to ...

Read More →
0

SEC Could Pressure Companies To Tighten CyberSecurity

Posted by:

SEC data breach reportingThe Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

The requirements could put pressure on companies to tighten their own security, because the SEC rules would let the public know how well firms are securing their private information.

On Tuesday, the White House launched a new ...

Read More →
0
Page 1 of 3 123
})
SEC Cybersecurity Exams