New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...
Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...
Who should setup access in the ERP (Financial Application)?
As an IT auditor for local governments, one of the most often asked questions I get during audits is this: “Who should set up user access...
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...
The Wolf
Stop what you are doing and watch this. It's a big ad for HP but you gotta take a minute to view it. Especially after what we were...
Measuring Security Performance: 3 Techniques You Need to Know
Measuring security performance is critical for any organization to identify vulnerabilities, mitigate potential risks, and improve...
Five Challenges of Computer Security
A Paper I wrote for American Military University, Criminal Justice Department Introduction After a recent lecture on information systems...