Tag: National Cybersecurity Institute

There has been a marked increase in ‘Ransomware’ attacks in recent years. Dan Whitcomb, writing for YahooTech reports that “More than $209 million in ransomware payments were made in the United States alone during the first three months of 2016, according to FBI statistics…” Cyber attackers typically use malware such as CryptoLocker in their ransomware …

Despite all the warnings about hackers attacking digital systems, despite all the media coverage of major breaches of big box organizations, despite news of hackers attacking our government agencies and critical infrastructure…the people who operate the systems continue to make the same old mistakes and open the cyber doors to those with malicious intent. Will …

Bearded man smiling during graduation

According to a blog recently posted on the Dropbox website, a 2012 data breach included the theft of 68 million email addresses and passwords. It is estimated that Dropbox has over 200 million customers, so the hack potentially impacted a significant percentage of its customers. At the time of the incident in 2012, customers were …

Over a week later, there are still many questions unanswered regarding the release of hacking tools purported to be from National Security Agency (NSA). Mostly murky information and speculation appears on various internet new sites and blog. General speculation at this time is that a previously unknown entity named Shadow Brokers posted stolen hacking tools …

To Update or Not Update…That is the Question We often hear that updates are available for our computers and smart phones, and often we ignore them. If you have an iPhone you had better pay attention and not pass up this update.  Heather Kelly writes “Security researchers on Thursday announced they had discovered a new …

Fool me twice shame on me… Numerous news sources are reporting today that the New York Times has once again been hacked by foreign intruders, and, fingers are being pointed at the Russians as the source of the attack.  This attack comes fresh on the heels of earlier cyber attacks…also blamed on Russian Intelligence…on the …

Vehicles have notoriously been vulnerable to attack from various sources. These have varied from the equipment, endpoints, and communication being insecure to open ports. Regardless of the source, these have historically and continue to provide ample attack surfaces for those with malicious intent. Engineers in the automotive industry have attacked this issue from the defensive …

Years ago, a business could plan to secure its enterprise. The IT department would harden the system and in most cases there would be a reasonable assurance the enterprise was relatively safe. Things have changed as technology has improved. This improvement has come at a price. The speed of advancement has not been the easiest …

The latest settlement for a potential HIPAA violation provides us with another example of the consequences of not conducting and documenting a comprehensive risk analysis and having a risk management plan. http://www.hhs.gov/about/news/2016/08/04/advocate-health-care-settles-potential-hipaa-penalties-555-million.html# According to the Open Group Standard Risk Analysis, a risk analysis is the evaluation component of the risk assessment process. The analysis is …