Recent Posts

Posted in Communications Wireless

Deco X60 WiFi 6 Upgrade

Overview I recently upgraded my home wireless network to the new WiFi 6 specification by deploying the TP-Link Deco X60. Like so many others, I…

Continue Reading... Deco X60 WiFi 6 Upgrade
network
Posted in Data Internet Safety Monitoring Risk and Vulnerability Security

A VLAN for IOT Devices

I have been considering ways to segment the traffic from IOT devices on my network. This post will detail and document my efforts as I employ VLANs for IOT devices.

Continue Reading... A VLAN for IOT Devices
microsoft
Posted in Risk and Vulnerability Security

KB4532693 Windows 10 Causes Data Loss

While there is no mention of the issue in the “known issues” section of the KB release announcement on Microsoft’s site, there is evidently a known bug causing files stored on the user’s desktop to be deleted

Continue Reading... KB4532693 Windows 10 Causes Data Loss
Posted in Business Regulation Risk and Vulnerability Security

Patch Management vs Vulnerability Management

A “vulnerability” is a weakness in the computational logic (e.g., code) found in software and some hardware components (e.g., firmware) that, when exploited, results in…

Continue Reading... Patch Management vs Vulnerability Management
Posted in Internet Safety Product Reviews Security

Vulnerability Management At Home

Recent articles have relayed security vulnerabilities and factual exploitations of those vulnerabilities in home security systems allowing hackers to speak to those in your home. You might also have financial management software or, possibly, work information on your home network. This is especially true for those who work from home. It is your responsibility to protect your assets.

Continue Reading... Vulnerability Management At Home
Posted in Gadgets Product Reviews

Jooki – An Amazing Bluetooth Speaker For Blind Children

If you have a visually impaired child, this is something you have to look at. You will love the construction and the freedom of choice that it brings to your child. It is great to see them have the option of exercising some control over their music choices.

Continue Reading... Jooki – An Amazing Bluetooth Speaker For Blind Children
Posted in Business Security

Staffing An Incident Response Team

When staffing a security incident response team, there are critical factors you should consider that could dramatically affect your success.

Continue Reading... Staffing An Incident Response Team
Posted in Security

Kill Chains and Post Compromise Assessment Frameworks

When it comes to methodologies for preventing and detecting compromise, there are some great options available that have been tried and tested. While no network security tactic or technique is fool proof and completely comprehensive, there are two overarching frameworks that have changed the landscape with regard to pre and post compromise assessment.

Continue Reading... Kill Chains and Post Compromise Assessment Frameworks
Posted in Breaking Gadgets Holidays Internet Safety Security

Hackers Breach Ring Home Security Cameras – NYT

Unnerved owners of Ring devices have reported recent hacks in four states.

Continue Reading... Hackers Breach Ring Home Security Cameras – NYT
Posted in Education Internet Safety

Google Chrome will now automatically you if your password is unsafe – CNN

Google added a new tool to Chrome that protects users’ passwords in an update released Tuesday. — Read on www.cnn.com/2019/12/11/tech/google-chrome-password-trnd/index.html I like this trend in…

Continue Reading... Google Chrome will now automatically you if your password is unsafe – CNN