Not Enough Caffeine

You finally snag the quiet corner at the coffee shop, you local retreat when you really need to get work done. Something about the ambient noise and the fact that nobody around you works with, near, or for you. Just a collection of pilgrims on the road to revenue, beneficiaries of the gig economy hopped up on espresso and pumpkin spice. Take the guy next to you, the one sporting skinny jeans over Chucky T’s and a faux flannel shirt beneath an emerging beardlet. He’s got the right glasses, an open Moleskine notebook in front of him, and just the right number of stickers on the opened lid of his MacBook Pro. Probably working on a social capital start-up, right? (more…)

Nobel Prizes And Cybersecurity

What can well-intentioned Swedes tell us about improving global cybersecurity? Quite a bit, probably, but specifically we should consider the recent award of the Nobel Prize in Economics to Richard Thaler, a professor at The University of Chicago. Thaler’s work in human behavior led to a bestseller titled “Nudge,” a book about helping people make better decisions. Among his findings was the reality that people didn’t voluntarily enroll in 401Ks until their employers made those decisions for them, essentially nudging the employees to be more proactive about the financial health. Once the companies made enrollment essentially mandatory, employees understood the benefit. (more…)

Dirty Deeds Done Dirt Cheap

There are two types of electrical power. The first is AC, or alternating current. It’s what comes out of the plug in the wall. The second is DC, which is stored and distributed by batteries. The combination of the two would be, well, shocking, and it might even generate classic hits like “Back in Black” and “Hell’s Bells.” But those are not the relevant stories about ACDC these days. (more…)

The Connector

It’s called the connector. The section of highway where I-75 and I-85 join together to pass through the booming metropolis of Atlanta. It is almost always congested, and it carries a lot of information, not unlike the building that used to rise above the north end of the massive swath of concrete. That’s where the Equifax building used to be, and might still be. (more…)

Beyond The Political

Politics is one of those topics best avoided among polite company, and this post in no way espouses particular views or partisan sentiments. It is difficult to talk about federal efforts to enhance cybersecurity without drawing attention to national politics, but that is what we hope to do. (more…)

Harvey The Unimaginable

Back in the day, there was an offbeat Broadway show about an imaginary rabbit that occupied the house and lives of good people. It just sort of seeped in, like a rising tide, from the basement. That rabbit’s name was Harvey, and he was seen only by those who really wanted or needed to see him. (more…)

Riding Along On Easy Street

Your organization is a well-oiled machine. It’s nimble, responsive, and ready to follow in any direction you lead. Or lean. In many ways, it’s like a Segway. You don’t want to get too far ahead of it, and if you stay behind it, the machine will simply stand still. You have to confidently lean in the direction you want it to go, and you have to trust it to respond accordingly. When you reach that level of synergy, you and your Segway — your organization — become one.

(more…)

The Swede Smell Of Cyber

Checking into the hotel in Stockholm, visiting Scandinavia with the family, I couldn’t help notice the local papers. On the cover, above the fold, was the face of a man frustrated with a recent turn of events. Even though I couldn’t read the words — I don’t know Swedish — I could tell the man was a politician. It was that kind of picture. Given the current state of American politics, it was almost refreshing to see another country swimming in scandal. Imagine my surprise, though, when I discovered the punchline. There were no prostitutes or drunken junkets. There was only cyber. But it was just as messy.

(more…)

Cat Stevens: Cybersecurity Hero

Though he now performs under a different name, Cat Stevens once had his finger on the hippy, singer-songwriter pulse in America. Naturally, this made him something of a cyber savant as well. Naturally. It was his early encouragement of software and firmware updates and the direct correlation between those and network security. And he worked all of this early magic into his lyrics. Specifically one line, which suggested that, “The patches make the goodbyes harder still.” Many assumed he was only referring to the blue jeans of our passing youth, faded blue into the sky. But give that joint a rest and read between the lines.

(more…)

You Have The Power, Mostly

Just when you thought it was safe to go back in the water, Russian hacking resurfaces in waters beyond the political. Sure, it was devastating when we realized that Russia had wormed its way into our electoral and democratic process, but that was apparently just the beginning of the story. (more…)

The Future of Cyber- Part Two

During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has some interesting perspectives on the nature of cyber threats going forward. The concept of deterrence, for example is complicated, at least on a national or global scale. “Deterrence requires attribution supported by evidence, further supported by classified information and practices,” Zheng suggests, and governments know that for every action there is a reaction, often deploying the same technology. So global resolution of cyber threat potential seems problematic.

(more…)

The Future of Cyber- Part One

During a recent talk at The Chautauqua Institution, Denise Zheng held forth on the nature of cyber conflict: past, present, and future. A Senior Fellow and the Director of Technology Policy at the Center for Strategic and International Studies, Zheng has also worked as a senate staffer on the Homeland Security Committee, in the Computer Associates software engineering process, and, most recently, on cyber moonshots at DARPA. So her perspective on cyber reflects and informs those of consumers, governments, and leading edge developers. (more…)

The Smaller They Are, The Harder They Fall

While the media streams constantly with news of big-name breaches that threaten the global economy to the core, an even more significant story grows on the outer banks of public awareness. Sure, the big banks and retailers have lots of data to steal, but they also have the resources to protect their networks. The same is not always true of smaller enterprises. Perhaps in recognition of this, ransomware attacks on small businesses are increasing in greater numbers than their Goliath counterparts, according to Small Business Trends.

(more…)

The Business Side Of Cyberthreats

The Wall Street Journal is not a publication prone to hyperbole, so a recent headline in the May 18th Business & Finance section screamed for attention. “Cyberthreats Breed Deep Unease” was the title of the article. The media would have us believe that all the really bad things seem to happen to multinationals or political parties. Nothing could be farther from the truth.

(more…)

When Cybersecurity Is Mainstream

Let’s face it. Most IT Departments feel undervalued or ignored. Like lawyers, you try to avoid them at cocktail parties until you need one. At least that’s the way it was in the old days, like back in 2015 or so. With the ever-advancing wave of cyberthreats and our reluctance to reduce the epic size of our digital footprints, cybersecurity is entering the mainstream in new and surprising ways. Consider a long but thorough examination of the current state of cybersecurity in, of all places, The New Yorker. Known more for it’s insights into western philosophy and the Upper Easy Side, even The New Yorker has recognized the growing ubiquitousness of cyberthreats. Have you?

(more…)

Hacking Ain’t What it Used to Be

Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t kept up with the rapid pace of technological innovation. After all, ARPANET was in its infancy in 1983, and the World Wide Web wouldn’t become a consumer reality until around 1990. Protecting isolated computers is a wildly different thing from keeping networked devices secure in the IOT world. (more…)

The Imperfect Storm

There’s a storm brewing, potential chaos lurking in the wings. And I’m not talking about politics. Though, if we’re being honest, there’s a storm brewing there, too. We can argue cause and effect, but the world is changing in palpable ways, probably more rapidly than we imagine. (more…)

When The Chips Are Down

Ever had that feeling that someone is watching you, like the door is ajar and folks just passing by the office can see everything on your desk? Have you felt that way for the last seven years? If so, you’re not alone, especially if your computers use Intel chips with vPro technology. According to a recent Ars Technica report, Intel has only recently provided a patch to a backdoor in your network that has been open since the year Facebook was launched. Think about that.

(more…)

Not What You Think It Is

Some things are exactly what you expect. A ballpene hammer, for example, is difficult to mistake for anything else. But if someone hammers your online presence, littering comment and review boxes with inaccurate characterizations of your business, the picture seen by your customers and prospects is very different from what you might imagine. (more…)

Who’s Baking Your Cookies?

So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the Internet. (more…)

Now You See It, Now You Don’t

Hacker trying to hack into phoneStand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by phishing your account information to unlock, wipe, and resell the phone. By standing against the wall, you limit the access and cover your blind side. Sadly, the stories are anything but rare. (more…)

Bundle Up To Avoid The Cold

Forest covered in snowWith every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating our elections. Though we could debate the extent of the success, nobody seems to doubt the intent any longer. If those chilly diplomatic breezes seem to intimate a second cold war, will cyber be the weapon of choice? Is it already?

(more…)

Very Personal Assistant

coffee
 Ever wonder what your team is doing when they are just out of earshot? Ever wonder what they’re talking about when the earbuds are deployed and their attention is elsewhere? Sure you have. It’s human nature. But hackers can now use inhuman technology to address those curiosities, leaving you to reconcile the creepy insecurity.

(more…)

Hillary’s Email and National Security

emailAs Republicans try to make political hay while the sun shines on Hillary’s private email server, another national security issue rears its ugly head from the latest batch of those released emails. The AP reported last month that Russian hackers tried to access Hillary’s private server at least five times while she was secretary of state. The attempts in 2011 were disguised as fake New York State traffic tickets and, if opened, would have embedded malware that would allow foreign nationals to control her server and access all of the information stored there. (more…)

Hacking the IRS History

April 15th lurks in the shadows of every year, as inescapable as the Grim Reaper and only slightly less popular. The IRS has conflict in its DNA, as our nation’s first revenue commission was established in 1862 to pay for the Civil War. Repealed ten years later and even ruled unconstitutional by the Supreme Court in 1895, the IRS began collecting income taxes in 1913, after the 16th Amendment was ratified, and the steady gathering of data began.

(more…)

Internet of Wings

Ever feel like somebody else is in control of your life, flying the airplane that is your body through the friendly skies of your daily routine? Well, if you’re on the same plane with Chris Roberts, you might just be living beyond the metaphor. Chris likes to fly big airplanes, with real people on them. But Chris Roberts is not a pilot.

(more…)

Nude Photos of Cybersecurity Hacked

Cybersecurity is a beautiful thing…

…but is it as beautiful as Jennifer Lawrence or Kate Upton? As always, beauty is in the eye of the beholder, but in recent days, beauty has also been in the hands of the hacker. While you may or may not have nude photos of yourself stored safely in the lofty and presumably secure ether in the sky, unauthorized access of your fully clothed data could leave you just as exposed and vulnerable as Hollywood’s publicists suggest their clients are.

(more…)

I’m probably already in your network, and you don’t even know it

networkaccessCan I get in your network? You betcha I can. As a matter of fact, there’s a good chance I’m already there. Now, here’s the really fun part: you let me in. (more…)

How a $5 cup of coffee could cost your company $10,000+ dollars

coffeeWe’ve all been there. Racing between appointments, suddenly realizing that you forgot to send one of your best clients an important document that needs to arrive within 10 minutes.  Being the super resourceful all-star executive (although sometimes forgetful), you stop off at your local coffee shop, order your mocha latte and quickly connect your laptop to the free Wi-Fi. You draft your email, attach your important document, and press send with one minute to spare. The day is saved!

Upon returning to the office, you see your IT security staff running around with their hair on fire yelling something about an intruder who breached the network and stole a 10,000-record database of sensitive customer information and how it can cost the company up to $3 per record to mitigate and protect your valuable customers. (more…)

Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor