Blog

The Human Factor
The Human Factor: Reason #1 to Lock Your Data Ports and Connectors

Posted on June 3 | Posted in cybersecurity data breach

A comprehensive report of cybersecurity threats entitled, “The Human Factor,” asserted that “people-centered threats define the landscape.”

Read More
How PC Security Hazards Exploded – and How to Secure Them
How PC Security Hazards Exploded – and How to Secure Them

Posted on May 20 | Posted in cybersecurity data breach port locks

Are we doing enough to protect our ubiquitous open ports, especially when the cost of protecting these ports is so inexpensive?

Read More
Sounding the Alarm Against Open USB Ports
Sounding the Alarm Against Open USB Ports

Posted on May 6 | Posted in flash drive breaches port locks

Without effective USB port security, every USB port in your data network or information system is an open invitation to malware, ransomware, and viruses.

Read More
It moves so rapidly that estimates alone account for the speed at which data networks are breached and compromised today. In the first half of 2019, about 4.5 billion records were exposed as a result of data breaches. In one 2019 incident alone, 2.7 billion identity records – including 774 million unique email addresses and 21 million unique passwords – were posted for sale on the web. The scale of the threat is almost incomprehensible. Possibly as a result, the solutions thrown at it on a daily basis can seem equally complicated and elaborate. And yet the fact is, that the most impactful data security breaches in history remain the ones that were perpetrated through devices, not web-borne viruses. And that physical dimension of cybersecurity remains to this day the sector that is virtually unguarded, the “open front door” of cybersecurity. The Dirty Dozen of 2019 Security Magazine recently published the top 12 data breaches of 2019. The sheer variety causes us to conclude that no sector of the cybersecurity perimeter should remain unguarded, particularly not the visible, accessible, physical sector. • 108 million records: ElasticSearch server breach – an online casino group leaked info on 108 million bets. • 139 million records: Canva data breach – graphic design site was raided for users from 44 companies globally. • 202 million records: MongoDB data breach – hacked personal and professional info of job candidates in China. • 275 million records: MongoDB data breach – exposed highly personal data on Indian citizens for two weeks. • 540 million records: Third-party Facebook apps (Cultura Colectiva and At the Pool) – two datasets exposed publicly, including ID, photos, and passwords. • 617 million records: Dream Market data breach – account details stolen from 16 hacked websites were up for sale. • 773 million records: Collection #1 data breach – dozens of breaches scored email and password combinations. • 808 million records: Verifications.io data breach – emails, phones, and business leads found from four collections. • 885 million records: First American data breach – largest title insurance company leaked complete transaction details. • 1 billion records: TrueDialog data breach – SMS messages, senders, and recipients were revealed. • 2 billion records: Orvibo Smart Home Database – precise ID and user data for home security and operations clients. • 4 billion records: Facebook and LinkedIn profiles data leak – exposed 4 terabytes, one of the largest breaches in history. The Two Dimensions of Cybersecurity There is no doubt the while the World Wide Web is fundamentally changing how we live, shop, receive medical care, invest our money – and so much more – there is also no doubt that the hazards are not only real, but also beyond anything we have ever witnessed in the development of business and industry. While many resources are being invested into stopping online attacks, we must not overlook the ease at which data can be downloaded by the workstations, desktop computers, and laptops that are ubiquitous to our work environments. Simply plugging in a USB flash drive or using that same USB drive to charge our cell phones can wreak as much damage as the hackers on the dark web. It’s time we focus as much on physical cybersecurity as we do on stopping threats that reside in the cloud.
The Top Security Breaches of 2019 – and What It Means to Us

Posted on April 15 | Posted in cybersecurity

The sheer variety of data breaches in 2019 causes us to conclude that no sector of the cybersecurity perimeter should remain unguarded.

Read More
It’s Not Information Until It Is Shared – Safely
It’s Not Information Until It Is Shared – Safely

Posted on April 1 | Posted in cybersecurity data breach port locks

While the current COVID-19 pandemic has put the world’s attention on a human virus, the threat of computer viruses remains real.

Read More
A Cost-Effective Solution to Protecting Your Data

Posted on March 25 | Posted in cybersecurity network security

It’s easy to overestimate how secure a workspace really is. Experience shows that in the workplace, computer theft is very often overlooked.

Read More
Guarding the Central Nervous System of the World

Posted on March 11 | Posted in cybersecurity network security

We have become utterly dependent on data. And yet, for the vast majority of systems, the physical points of access to our data networks remain unguarded.

Read More
The Myriad Facets of Computer System Security

Posted on February 19 | Posted in network security

Most cybsersecurity solutions are designed to react to an incursion, rather than to prevent it, leaving the billions of data ports and connectors unguarded.

Read More
Taming the Wild, Wild World of Cybersecurity

Posted on February 5 | Posted in cybersecurity

There is remarkably little consensus on reliable sources for cyber defense. Rarely has so much been invested with so little assurance of knowledge?

Read More
Studying mathematics educational background. Books pile, pencils, scissors, magnifying glass and apple against classroom blackboard with chalk writing of sums. Back to school, research concept
When It Comes to DIKW, It’s Never Easy to Get Smart

Posted on January 15 | Posted in cybersecurity network security

The pyramid of Data-Information-Knowledge-Wisdom (DIKW) has become a critical element for defending against network contamination and sabotage.

Read More