Reservation For A Nigerian Prince
Ever gotten one of those emails that lets you know your account has been hacked? Maybe it was your email account, and all of your contacts received a quirky email from you unawares, touting the benefits of a particular enhancement drug or the prospects of a Nigerian fortune. Those are pretty common. But how about something a little less ordinary. (more…)
Today’s Data Brought To You By…
Net Neutrality has been a big topic of late, and that is unlikely to change in the near term. There are probably good arguments on all sides of the debate, but no matter where your opinion shakes out on the spectrum, your business is likely to be affected in some way. (more…)
I Ship You Not
It’s a new year, and the time is right for thinking about how you might do things differently as your organization rides the tides and the stormy seas of commerce that lay ahead. This maritime metaphor is intentional and informative, so let’s see where it goes. To “strengthen the cybersecurity of federal networks and critical infrastructure,” the Trump Administration issued Executive Order 13800. (more…)
Resolve On New Year’s Eve
If you could ring in the new year with cyber certainty, would you do it? Yeah, we would too, but the only degree of certainty that seems to creep into the cyber conversation is the certainty that everyone is vulnerable. And the number and cost of threats seems to often outpace the good guys. We still see the glass as half-full, though, and if you’re reading this, you probably do as well. As you cultivate resolutions for 2018, what can you do to improve your odds? (more…)
Santa Claus, Cyber Savant
‘Tis the night before Christmas. You’ve hung the stockings with care and set out the cookies and carrots. Your organization’s year-end results suggest that you’ve been good, but you better not cry, better not pout, and here’s why: you’re hoping for even more growth in 2018 and Santa’s coming to town. (more…)
Budgeting For A Breach
There is a heightened national awareness of the pervasive nature of cyberthreats in our world. Just as important, though, is heightened awareness at the local level, in the minds and eyes of the small business and independent government contractor. The risk for them, for you, is just as real if not as heavily funded. (more…)
Everybody’s Home, But Nobody’s Knocking
As we roll into the holiday season, with Black Friday behind us and stockings soon to be hung from the chimney with care, all eyes are on retail. Santa works hard year-round, but the elves make most of their big-money between Thanksgiving and New Year’s. Customers are hard won, and marketing dollars are stretched as far as they will go.
Even if you are not in the retail business, your organization only grows if you are able to attract and retain the customers. To keep customers, you have to earn their trust with each and every transaction, each and everyday. Once the trust is been violated, the road may no longer rise up to meet you. Just ask the friendly folks at Equifax.
In reporting their recent earnings and projecting for the next quarter, Equifax indicated that the economic impact of the recent breach may exceed $75 million. Among the more difficult tasks will be earning the trust of their customers. They also gave no indication that this will be the end of the revenue drain posed by the breach. The interim CEO described the process as a “Journey.” Have you got the right tools?
A Map And A Compass
Maybe your organization is bigger than a quick fax. Maybe it’s not. And maybe insurance would cover some of your exposure. Then again maybe not. This is just the tip of the iceberg of the questions you should be asking.
That’s the great thing about ICS. Not only do we have the right answers, we have the right questions. Why don’t you call today? See what I just did there?
No File Left Behind
When you’re hiking the Appalachian Trail, it’s important to leave no trace. LNT has become a maxim of sorts among those who engage the outdoors, but over the last several months, the implications for cybersecurity have emerged. Or not. Maybe they haven’t emerged, and that’s the problem. (more…)
Remember the presidential election of 2016? With new books out and some cable talk shows unable to let it go, chances are pretty good you do. And you probably remember the little hack at the heart of much of the controversy, so let’s focus on that, without placing blame or extrapolating any political fodder in the process. Just the facts and what they mean for your cybersecurity posture. (more…)
When the CEO is also the CIO
We’ve dedicated some recent blog real estate to the threats faced by CEOs of big companies and directors of IT departments within larger companies. These threats abound, and ICS works with companies within those spaces to protect networks and data. But sometimes the boardroom table is also the kitchen table. (more…)
From Oslo With Love
Let’s say you’re in the widget business. You studied widgets in college, made Lego widgets as a child, even named your dog Widget. If there’s anything you know a thing or two about, it’s widgets. And you’ve built a great business building widgets. Those in the know call you the Widget King. You’ve put three kids through college on widgets and even bought yourself a little widget bungalow on a coastal island somewhere. You are the man, or the woman! (more…)
Not Enough Caffeine
You finally snag the quiet corner at the coffee shop, you local retreat when you really need to get work done. Something about the ambient noise and the fact that nobody around you works with, near, or for you. Just a collection of pilgrims on the road to revenue, beneficiaries of the gig economy hopped up on espresso and pumpkin spice. Take the guy next to you, the one sporting skinny jeans over Chucky T’s and a faux flannel shirt beneath an emerging beardlet. He’s got the right glasses, an open Moleskine notebook in front of him, and just the right number of stickers on the opened lid of his MacBook Pro. Probably working on a social capital start-up, right? (more…)
Nobel Prizes And Cybersecurity
What can well-intentioned Swedes tell us about improving global cybersecurity? Quite a bit, probably, but specifically we should consider the recent award of the Nobel Prize in Economics to Richard Thaler, a professor at The University of Chicago. Thaler’s work in human behavior led to a bestseller titled “Nudge,” a book about helping people make better decisions. Among his findings was the reality that people didn’t voluntarily enroll in 401Ks until their employers made those decisions for them, essentially nudging the employees to be more proactive about the financial health. Once the companies made enrollment essentially mandatory, employees understood the benefit. (more…)
Dirty Deeds Done Dirt Cheap
There are two types of electrical power. The first is AC, or alternating current. It’s what comes out of the plug in the wall. The second is DC, which is stored and distributed by batteries. The combination of the two would be, well, shocking, and it might even generate classic hits like “Back in Black” and “Hell’s Bells.” But those are not the relevant stories about ACDC these days. (more…)
It’s called the connector. The section of highway where I-75 and I-85 join together to pass through the booming metropolis of Atlanta. It is almost always congested, and it carries a lot of information, not unlike the building that used to rise above the north end of the massive swath of concrete. That’s where the Equifax building used to be, and might still be. (more…)
Beyond The Political
Politics is one of those topics best avoided among polite company, and this post in no way espouses particular views or partisan sentiments. It is difficult to talk about federal efforts to enhance cybersecurity without drawing attention to national politics, but that is what we hope to do. (more…)
Harvey The Unimaginable
Back in the day, there was an offbeat Broadway show about an imaginary rabbit that occupied the house and lives of good people. It just sort of seeped in, like a rising tide, from the basement. That rabbit’s name was Harvey, and he was seen only by those who really wanted or needed to see him. (more…)
Riding Along On Easy Street
The Swede Smell Of Cyber
Cat Stevens: Cybersecurity Hero
You Have The Power, Mostly
Just when you thought it was safe to go back in the water, Russian hacking resurfaces in waters beyond the political. Sure, it was devastating when we realized that Russia had wormed its way into our electoral and democratic process, but that was apparently just the beginning of the story. (more…)
The Future of Cyber- Part Two
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has some interesting perspectives on the nature of cyber threats going forward. The concept of deterrence, for example is complicated, at least on a national or global scale. “Deterrence requires attribution supported by evidence, further supported by classified information and practices,” Zheng suggests, and governments know that for every action there is a reaction, often deploying the same technology. So global resolution of cyber threat potential seems problematic.
The Future of Cyber- Part One
During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has also worked as a senate staffer on the Homeland Security Committee, in the Computer Associates software engineering process, and, most recently, on cyber moonshots at DARPA. So her perspective on cyber reflects and informs those of consumers, governments, and leading edge developers. (more…)
The Smaller They Are, The Harder They Fall
The Business Side Of Cyberthreats
When Cybersecurity Is Mainstream
Hacking Ain’t What it Used to Be
Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t kept up with the rapid pace of technological innovation. After all, ARPANET was in its infancy in 1983, and the World Wide Web wouldn’t become a consumer reality until around 1990. Protecting isolated computers is a wildly different thing from keeping networked devices secure in the IOT world. (more…)
The Imperfect Storm
There’s a storm brewing, potential chaos lurking in the wings. And I’m not talking about politics. Though, if we’re being honest, there’s a storm brewing there, too. We can argue cause and effect, but the world is changing in palpable ways, probably more rapidly than we imagine. (more…)
When The Chips Are Down
Not What You Think It Is
Some things are exactly what you expect. A ballpene hammer, for example, is difficult to mistake for anything else. But if someone hammers your online presence, littering comment and review boxes with inaccurate characterizations of your business, the picture seen by your customers and prospects is very different from what you might imagine. (more…)
Who’s Baking Your Cookies?
So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the Internet. (more…)
Now You See It, Now You Don’t
Stand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by phishing your account information to unlock, wipe, and resell the phone. By standing against the wall, you limit the access and cover your blind side. Sadly, the stories are anything but rare. (more…)
Bundle Up To Avoid The Cold
With every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating our elections. Though we could debate the extent of the success, nobody seems to doubt the intent any longer. If those chilly diplomatic breezes seem to intimate a second cold war, will cyber be the weapon of choice? Is it already?
Very Personal Assistant
Hillary’s Email and National Security
As Republicans try to make political hay while the sun shines on Hillary’s private email server, another national security issue rears its ugly head from the latest batch of those released emails. The AP reported last month that Russian hackers tried to access Hillary’s private server at least five times while she was secretary of state. The attempts in 2011 were disguised as fake New York State traffic tickets and, if opened, would have embedded malware that would allow foreign nationals to control her server and access all of the information stored there. (more…)
Hacking the IRS History
April 15th lurks in the shadows of every year, as inescapable as the Grim Reaper and only slightly less popular. The IRS has conflict in its DNA, as our nation’s first revenue commission was established in 1862 to pay for the Civil War. Repealed ten years later and even ruled unconstitutional by the Supreme Court in 1895, the IRS began collecting income taxes in 1913, after the 16th Amendment was ratified, and the steady gathering of data began.
Internet of Wings
Ever feel like somebody else is in control of your life, flying the airplane that is your body through the friendly skies of your daily routine? Well, if you’re on the same plane with Chris Roberts, you might just be living beyond the metaphor. Chris likes to fly big airplanes, with real people on them. But Chris Roberts is not a pilot.
Nude Photos of Cybersecurity Hacked
Cybersecurity is a beautiful thing…
…but is it as beautiful as Jennifer Lawrence or Kate Upton? As always, beauty is in the eye of the beholder, but in recent days, beauty has also been in the hands of the hacker. While you may or may not have nude photos of yourself stored safely in the lofty and presumably secure ether in the sky, unauthorized access of your fully clothed data could leave you just as exposed and vulnerable as Hollywood’s publicists suggest their clients are.
I’m probably already in your network, and you don’t even know it
Can I get in your network? You betcha I can. As a matter of fact, there’s a good chance I’m already there. Now, here’s the really fun part: you let me in. (more…)
How a $5 cup of coffee could cost your company $10,000+ dollars
We’ve all been there. Racing between appointments, suddenly realizing that you forgot to send one of your best clients an important document that needs to arrive within 10 minutes. Being the super resourceful all-star executive (although sometimes forgetful), you stop off at your local coffee shop, order your mocha latte and quickly connect your laptop to the free Wi-Fi. You draft your email, attach your important document, and press send with one minute to spare. The day is saved!
Upon returning to the office, you see your IT security staff running around with their hair on fire yelling something about an intruder who breached the network and stole a 10,000-record database of sensitive customer information and how it can cost the company up to $3 per record to mitigate and protect your valuable customers. (more…)