network
Posted in Data Internet Safety Monitoring Risk and Vulnerability Security

A VLAN for IOT Devices

I have been considering ways to segment the traffic from IOT devices on my network. This post will detail and document my efforts as I employ VLANs for IOT devices.

Continue Reading... A VLAN for IOT Devices
microsoft
Posted in Risk and Vulnerability Security

KB4532693 Windows 10 Causes Data Loss

While there is no mention of the issue in the “known issues” section of the KB release announcement on Microsoft’s site, there is evidently a known bug causing files stored on the user’s desktop to be deleted

Continue Reading... KB4532693 Windows 10 Causes Data Loss
Posted in Business Regulation Risk and Vulnerability Security

Patch Management vs Vulnerability Management

A “vulnerability” is a weakness in the computational logic (e.g., code) found in software and some hardware components (e.g., firmware) that, when exploited, results in…

Continue Reading... Patch Management vs Vulnerability Management
Posted in Internet Safety Product Reviews Security

Vulnerability Management At Home

Recent articles have relayed security vulnerabilities and factual exploitations of those vulnerabilities in home security systems allowing hackers to speak to those in your home. You might also have financial management software or, possibly, work information on your home network. This is especially true for those who work from home. It is your responsibility to protect your assets.

Continue Reading... Vulnerability Management At Home
Posted in Business Security

Staffing An Incident Response Team

When staffing a security incident response team, there are critical factors you should consider that could dramatically affect your success.

Continue Reading... Staffing An Incident Response Team
Posted in Security

Kill Chains and Post Compromise Assessment Frameworks

When it comes to methodologies for preventing and detecting compromise, there are some great options available that have been tried and tested. While no network security tactic or technique is fool proof and completely comprehensive, there are two overarching frameworks that have changed the landscape with regard to pre and post compromise assessment.

Continue Reading... Kill Chains and Post Compromise Assessment Frameworks
Posted in Breaking Gadgets Holidays Internet Safety Security

Hackers Breach Ring Home Security Cameras – NYT

Unnerved owners of Ring devices have reported recent hacks in four states.

Continue Reading... Hackers Breach Ring Home Security Cameras – NYT
Posted in Education Internet Safety

Google Chrome will now automatically you if your password is unsafe – CNN

Google added a new tool to Chrome that protects users’ passwords in an update released Tuesday. — Read on www.cnn.com/2019/12/11/tech/google-chrome-password-trnd/index.html I like this trend in…

Continue Reading... Google Chrome will now automatically you if your password is unsafe – CNN
Posted in Breaking Internet Safety Mobile

Apple releases iOS 13.3, watchOS 6.1.1, and tvOS 13.3, here’s what’s new [U: HomePod] – 9to5Mac

Apple releases iOS 13.3, watchOS 6.1.1, and tvOS 13.3, here’s what’s new [U: HomePod] – 9to5Mac — Read on www.google.com/amp/s/9to5mac.com/2019/12/10/ios-13-3-whats-new-features-changes/amp/

Continue Reading... Apple releases iOS 13.3, watchOS 6.1.1, and tvOS 13.3, here’s what’s new [U: HomePod] – 9to5Mac
Posted in Internet Safety Security

Do I Need a Firewall?

Do I need a firewall? What will firewalls do for consumers? Is my router a firewall? Consumers need to protect their assets.

Continue Reading... Do I Need a Firewall?