Posts Tagged ‘#cybersecurity’
Brick By Brick: Using Security Awareness Training to Build Robust Defenses
You may think they’re a kid’s toy, but one of my favorite things to do on my days off is building Legos. Ever since I was a kid I have always enjoyed playing and building with Legos and now as an adult, I get to build and display some of the most creative and unique…
Read MoreUnderstanding the Principle of Least Privilege
The Jurassic Park Lesson The Principle of Least Privilege is the principle that users and programs should only have the necessary privileges to complete their tasks. In the case of Jurassic Park, this whole situation could have been avoided if they had applied the principle of least privilege throughout the systems in the park. Sure, Dennis…
Read MoreMalware Analysis of the Emotet Banking Trojan
Current Day Heist Ever since I can remember, my Dad has always loved watching heist movies. Whether it was Ocean’s 11, Catch Me If You Can, National Treasure, or the Italian Job, if there is a heist movie on TV, he’s watching it, and more than likely changing the channels during the commercials if there…
Read MoreTop Secret: A Guide to Implementing Data Classification in Environments
Classified Conversations When I was 12 years old, on one occasion at my best friend’s family dinner, everyone went around the table talking about their day and what they did, except for my friend’s father. Curious why he hadn’t said anything, I asked him what he did for work and how it was going. After…
Read MoreA Day in the Life… Cybersecurity Edition
Beyond the Hollywood Hacker A hooded figure sits at a small desk in complete darkness with just the light of the computer screen dimly illuminating the outline of their face as they furiously pound away at their keyboard. Suddenly they stop typing and in an ominous voice exclaim “I’m in!” For most people when they…
Read MoreIdentifying and Reporting Cybersecurity Incidents
Discover how to best identify and report cybersecurity incidents! Knowing what to look for when evaluating a potential cybersecurity incident and being prepared to handle a cybersecurity incident is extremely important in today’s world, when a majority of incidents go unreported.
Read MoreRansomware and How to Protect Your District (by Scott Augenbaum)
It’s fair to say that “Ransomware Attacks” are on the rise. Protect your district with these best practices from former FBI Agent, Scott Augenbaum.
Read MoreOne Password to Rule Them All!
5 Steps to Protect PII
A Practical Guide For Protecting Our Most Important Information It seems that week after week there is a new story in the news about yet another company suffering a data breach. It has become so commonplace now that only the truly large breaches make the headlines. But despite truly staggering numbers of data breaches, many…
Read More