New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...
Computer Performance: Upgrade or New?
Question from a friend. “I have a computer with a 10-year-old processor running Windows 7. I need better performance from my computer....
Cybersecurity Policy Coverage
What topics need to be covered in cybersecurity policies? In this post, I will cover the required cybersecurity policies from various...
Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...
Tax Identity Theft
Tax season is upon us, and filing a tax return to get a refund in the bank can cause anxiety and excitement at the same time. However, if...
Who should setup access in the ERP (Financial Application)?
As an IT auditor for local governments, one of the most often asked questions I get during audits is this: “Who should set up user access...
Hacked or Spoofed?
Do you know the difference? You may have seen a friend request on Facebook from someone you know and had thought you were already friends...
What Should be in a Good Cybersecurity Policy
I often get called in to evaluate cybersecurity documentation, more specific policies and procedures. One of the concerns is what to...
Policy, Procedure, or Plan
Some standards like PCI and NIST require policies that cover specific topics. Sometimes you will see a requirement for a policy and...
Nation-State Threat Actors
There has been a rise in the number of cyberattacks attributed to nation-states. Whether this increase is due to a rise in nation-state...