Archive for the ‘Executive Tips’ Category

 

Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Continue reading ‘Happy Computer Security Day!’


Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers

Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things. Continue reading ‘Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers’


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong.  Continue reading ‘Do the Basics. Do not Believe that Threat Protection Software Will Save You.’


Your Software, such as CCleaner, May Have Backdoors

Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Continue reading ‘Your Software, such as CCleaner, May Have Backdoors’


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall.

Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, sticks, or brick to build their cyber-security protection. See which you are, and how to improve: Continue reading ‘Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It’


Attackers Are Using Mobile Devices as a Bridge into Your Network

A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way. Continue reading ‘Attackers Are Using Mobile Devices as a Bridge into Your Network’


Alert Your IT Team – Urgent Patch for Network Servers

Many organizations use VMware to host their servers. VMware has released an urgent update they label as Continue reading ‘Alert Your IT Team – Urgent Patch for Network Servers’


Alert IT to Graphics Component Patches

Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about… Continue reading ‘Alert IT to Graphics Component Patches’


How My Daughter Almost Died This Weekend & a Resolution Recommendation for You

My 7-year-old daughter has been very ill since Thanksgiving. She has been under the careful care of her pediatricians at the medical system to which we belong. They have more than 10 million health plan members across the US, so they can be trusted, right? Continue reading ‘How My Daughter Almost Died This Weekend & a Resolution Recommendation for You’


Smooth and Slippery for IT Security

When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides a potential toe-hold that an attacker can use to access your systems. The key Continue reading ‘Smooth and Slippery for IT Security’