Really a timeout on my phone and tablet? Yes while this may feel silly it only takes a few seconds for an attacker to place something on your phone. Here is how you can change your lock screens and timeouts! Set or change a screen lock Important: To ensure your automatic and manual backups are encrypted […]
Did you do your part? WFH Dangers
A lot of people are working from home today. With the pandemic causing all of us to isolate and being forced to work remotely, we bring new challenges to IT security. Most people are not IT security analysts but are required to know what is safe when working remotely. The bad guys are switching gears […]
CIA Triad. The Security Triad to learn, love, and design by.
No we are not talking about the Criminal Investigations Agency but rather a model that IT security professional use as a guide. Confidentiality, Integrity and Availability are 3 goals that security professional ensure that each service or data point adheres too. Defenders want Confidentiality – attackers use Information DisclosureDefenders want Integrity – attackers use TamperingDefenders […]
Change the SSID on your home Network. NOW!
Tip of the Day 10/28 Are you one of the millions of households still rocking that Century link or Linksys SSID on your wireless? Leaving your home router with default names leaves your home vulnerable to attacks. The art of war driving is an attackers paradise. This involves the attacker to drive through neighborhoods while […]