Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...
Who should setup access in the ERP (Financial Application)?
As an IT auditor for local governments, one of the most often asked questions I get during audits is this: “Who should set up user access...
What Should be in a Good Cybersecurity Policy
I often get called in to evaluate cybersecurity documentation, more specific policies and procedures. One of the concerns is what to...
Spread the Word on Cyber Safety
As you may know, October is cybersecurity awareness month. Each week has a new theme and this week is about the importance of training...
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...
Default Security Settings, What Needs to Change?
Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The...
Cybersecurity & IT Soft Skills
Soft Skills are important for any career in cybersecurity and information technology profession. Without the necessary you may limit...
Microsoft's Security Events
According to Cisco’s 2017 Annual Cybersecurity Report, one in five organizations lose customers due to an attack, and nearly 30% lost...
FruitFly Malware
A Justice Department indictment alleges a 28-year-old hacker from Ohio, created the FruitFly malware and spied on Apple computers for 13...