BYOD

BYOD and Securing It to Protect Your Organization

BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery and enrollment process. Customize the…

cybersecurity career

Tips to Begin a Cybersecurity Career

I have worked in the cybersecurity space for about 14 years now. I found my way into cybersecurity from being a network engineer who needed to fill a technology gap on my then team – as a security subject matter expert.

I have been approached over the years by folks looking to begin a career in cybersecurity and/or gain a much deeper appreciation of this field. There are many reasons for these inquiries and it’s not necessarily for the paycheck alone. It’s a role that comes with an incredible amount of responsibility and brings immense value to any organization. I know that for myself, helping organizations better secure their business assets, and as such- their overall business, makes me feel a sense of gratitude and accomplishment for my investment in time and experience to learn this craft.

CPU Vulnerabilities

The Low Down on the CPU Vulnerabilities

As you’ve probably already noticed a few highly dangerous CPU vulnerabilities have been released that effect the CPU at a hardware level. Since this is base off the hardware itself all operating systems (Windows, Linux, Android, macOS) need to protect against it. This means patching their operating systems to mitigate against the threats that the Intel CPU’s have introduced. Now before you run out and grab the latest patch from the OS vendors be warned. There’s a possibility that this could actually cause negative performance on your system and include system crashes.

cybersecurity education

Schools are Under Attack

Many hackers are opportunistic predators and will slide to the lowest common denominator when preying on their next victims. Over the past year we’ve seen hackers direct their attention to the education sector; particularly K-12. It’s always appalling when children are taken advantage of in any manner and having their data stolen, ransomed, or leaked is no different. These children are the youth of our nation and have no sense of what’s happening to the privacy of their personal data. These breaches could have long term ramifications on children long before they’ve even applied for college or been given a driver’s permit. We live in an age now where hackers will look to disrupt and take advantage of anyone to benefit their own cause. There is no honor among thieves.

national cyber security

WannaCry Biggest Test of the Year, Says UK’s National Cyber Security Centre

The NCSC (National Cyber Security Centre), which completes one year, has made this observation in its first annual review.

The NCSC was launched in October 2016 with an objective to help UK’s “…critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.” The National Cyber Security Centre supports critical organizations, the public sector, industry and small and medium enterprises (SMEs).