March 04, 2020
Technological Impacts of Coronavirus: Is Your Environment Prepared?
You have probably heard of this interesting virus affecting people in other countries. However, have you considered the organizational impact Coronavirus may already have on your business today? What about when, not if, it proliferates in the United States? All major publications and news outlets – the New York Times, The Wall Street Journal, CNBC, […]
Read more
October 25, 2019
Teachable Moments in IT
An article caught my eye this week. It involves the unfortunate circumstances in the city of Baltimore, but it’s a valuable lesson to any organization (link below). In short, a combination of ransomware and poorly managed backups wreaked havoc on the City of Baltimore. The unfortunate situation is a good reminder of how the best […]
Read more
August 02, 2019
Avoiding the Capital One Breach: Defense in Depth
With the release of the criminal complaint in the recent Capital one breach we now have a better understanding of how Paige A. Thompson exfiltrated data from their cloud vendor. We don’t know all the details and can only make inferences based upon the information available. Deploying CloudGuard on AWSCase Study The complaint states that a GitHub file was […]
Read more
July 30, 2019
VxWorks Vulnerabilities: More Exposure Than You Think
Six of the URGENT/11 bugs can be exploited to achieve remote code execution (RCE). At least one bug affects each version of the OS starting with 6.5, while others can lead to a denial of service (DoS) attack. Well, while this is something you may not have heard of it is the real time operating system […]
Read more
July 23, 2019
Your Password Policy Should Challenge Hackers, Not Your Users
Any time a human is involved, the potential for weakened security increases. Password policies are necessary for cybersecurity compliance; however, burdensome password policies can result in bad user behavior like password transformation. SUBSCRIBE TO SAYERS BLOG REMEMBER WHEN – IBM published the startling statistic that human error was found to be involved in 95% of all security incidents in “2014 Cyber […]
Read more