Shocked by False Security in Medical Records Software – The Rough Edges of Encryption Claims

Recently, the Federal Trade Commission (FTC) announced a $250,000 fine and a Consent Order with Henry Schein over misleading claims about encryption in their software. If we're honest, for the average consumer it’s not even a blip on the radar. That changes when we're talking about a child's health records. I've…

Continue Reading Shocked by False Security in Medical Records Software – The Rough Edges of Encryption Claims

Wireless Risks will Wreck your Day – Pick Secure HotSpots and Watch for the Signs

At work, home, or in public, everyone is exposed to threats while using WiFi on their phones, tablets or computers. Fortunately, many Wi-Fi risks can be mitigated easily. "Open" hotspots create an immediate risk of eavesdropping with few barriers, but even secured networks in public can compromise the path between…

Continue Reading Wireless Risks will Wreck your Day – Pick Secure HotSpots and Watch for the Signs

Usual Suspects – Let’s Play Patch or Pitch

    Updated: This is an outdated list, but I leave it here as a reminder.  Software has security a half-life.  That half-life is the combination of how long it takes for an attacker to find a weakness, for an exploit to be developed, and for you to realize it's…

Continue Reading Usual Suspects – Let’s Play Patch or Pitch

Drop that USB Now and Back Away from the Laptop

"Good News for hackers: People still plug found USB sticks into their Computers", a great example of social engineering by CompTIA.  As it turns out, more than 1 in 6 people will pick up a "found" USB flash drive from a public place and plug it in to see what’s…

Continue Reading Drop that USB Now and Back Away from the Laptop

Launch an Information Security Program for any Size Team – Cybersecurity Tips from the Pros

    In what has become a “tip of the iceberg” wave of security breach reporting, most companies suffer the effects quietly.   Each year we look back on countless examples of large and small companies falling victim to cyber security breaches.   While the largest cases (often with tens…

Continue Reading Launch an Information Security Program for any Size Team – Cybersecurity Tips from the Pros

5 Steps to Find and Eliminate Security Vulnerabilities

It's unavoidable today. Personal computers, smart phones, tablets, and other network and Internet connected devices run software from multiple sources. That’s great and it makes us pretty happy most of the time. We get great software, communicate fluidly and quickly, and work more efficiently. The problem is that software can…

Continue Reading 5 Steps to Find and Eliminate Security Vulnerabilities

You have reached the last post.

No more pages to load