Tips to Begin a Cybersecurity Career

I have worked in the cybersecurity space for about 14 years now. I found my way into cybersecurity from being a network engineer who needed to fill a technology gap on my then team – as a security subject matter expert.

I have been approached over the years by folks looking to begin a career in cybersecurity and/or gain a much deeper appreciation of this field. There are many reasons for these inquiries and it’s not necessarily for the paycheck alone. It’s a role that comes with an incredible amount of responsibility and brings immense value to any organization. I know that for myself, helping organizations better secure their business assets, and as such- their overall business, makes me feel a sense of gratitude and accomplishment for my investment in time and experience to learn this craft.

Details

The Low Down on the CPU Vulnerabilities

As you’ve probably already noticed a few highly dangerous CPU vulnerabilities have been released that effect the CPU at a hardware level. Since this is base off the hardware itself all operating systems (Windows, Linux, Android, macOS) need to protect against it. This means patching their operating systems to mitigate against the threats that the Intel CPU’s have introduced. Now before you run out and grab the latest patch from the OS vendors be warned. There’s a possibility that this could actually cause negative performance on your system and include system crashes.

Details

Exchange Online – Are You Ready?

Are you looking to implement a new email system or to migrate from an old version of Exchange to the most current? If so, you may want to look at implementing it in Exchange Online. Exchange online, not to be confused with Office 365, or Microsoft 365, would be the online version of Exchange hosted by Microsoft. Options are always good, and with Exchange Online you have a few. This path may not be the answer for all types of businesses, but it bears looking into.

Details

Schools are Under Attack

Many hackers are opportunistic predators and will slide to the lowest common denominator when preying on their next victims. Over the past year we’ve seen hackers direct their attention to the education sector; particularly K-12. It’s always appalling when children are taken advantage of in any manner and having their data stolen, ransomed, or leaked is no different. These children are the youth of our nation and have no sense of what’s happening to the privacy of their personal data. These breaches could have long term ramifications on children long before they’ve even applied for college or been given a driver’s permit. We live in an age now where hackers will look to disrupt and take advantage of anyone to benefit their own cause. There is no honor among thieves.

Details

How Big Data Will Change the Criminal Equity Framework?

The definition of Big Data is usually that which refers to the practise of accumulation of extraordinary Big Data from a variety of different sources and then converting that data towards learning new data or towards supply of valuable services.

Big Data has been used by private organizations for a long time. Retailers utilize it to decide client conduct and influence shopping propensities. Insurance agencies depend on Big Data to endeavor to figure out who the most secure drivers and most advantageous individuals are. And a wide range of organizations purchase and pitch this information to each other, trying to dig it for data about their clients that they can use for monetary preferred standpoint.

Details

WannaCry Biggest Test of the Year, Says UK’s National Cyber Security Centre

The NCSC (National Cyber Security Centre), which completes one year, has made this observation in its first annual review.

The NCSC was launched in October 2016 with an objective to help UK’s “…critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.” The National Cyber Security Centre supports critical organizations, the public sector, industry and small and medium enterprises (SMEs).

Details

Securing our Critical Infrastructure – What You Need to Know

The Internet powers the United States’ critical infrastructure. Every day, Americans connect to the national grid without realizing it. Consumers use their smartphones, tablets, and computers to conduct online banking or place an online medication order using a medical insurance provider, for example. Similarly, truckers, chemists, politicians, and others all interact with the U.S. critical infrastructure whenever they connect to their companies’ networks.

Details

Podcast: National Cyber Security Awareness Month (NCSAM)

  Helpful Links: National Cyber Security Awareness Month – Information, events, content, blogs, and infographics Cybersecurity in the Work Place Infographic – Every business faces cybersecurity challenges, no matter the industry or size. Take these steps to proactively protect your customers, employees and intellectual property – and by extension your business’ reputation and success.  

Details

Break into an Information Security Career

National Cyber Security Awareness Month week 4 theme is: The Internet Wants You: Consider a Career in Cybersecurity. Considering the cybersecurity skill shortage, (Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020) we should be encouraging students to enter into a cybersecurity career.  However,…

Details

Security By Design Shouldn’t be Like Groundhog’s Day

With the increasing exploits and attacks of the past year it’s shown us that security needs to be treated as commodity in an organization. Just as there’s coffee in the break room there should be security in your processes. The culture of security needs to be built into the design process itself and today it’s just as important as both marketing and sales. We’ve seen major breaches occur this year which have destroyed organizations reputations, revenue streams and careers.

Details

Cybersecurity Trends That Shook 2017

Every week it seems like we’re hearing more and more companies are getting hacked. It was a major event in the 2016 US election, and likely will continue to have an influence in the political sphere. Entertainment companies, especially, seem to be the target of hackers who then hold unreleased content for ransom. Cybersecurity services and technology are expanding at blazing speeds, and it’s important for you to keep up with them. Here are a few cybersecurity trends that companies and organizations have had to monitor in 2017.

Details

5 Areas to Consider to Keep You Safe Online

It doesn’t matter if you are a CEO, accountant, or dog trainer – everyone needs to be secure online. October is National Cyber Security Awareness Month (NCSAM) and one of the main goals of the event is for us “security experts” to think of new ways we can educate our family, friends, and peers to be secure online. Even with all the technology available to businesses now, we still find the human element of security to be the weakest link.

Details

Equifax Breach: What Aspects Need To Be Consider?

When the news that Equifax had a data breach was first to come out, people initially thought that “This is very bad.” In the days since then, the news has not gotten much enhanced. The implications are fundamentally permanent. Since the breach affected 143 million Americans and thousands of Canadians more than half of all the adults who live in the respective countries. But what we need to assume that our most private data is no longer secure.

Details

Take a Dynamic Approach to SDN Security

Virtualized networks and SDN (software-defined network) architectures are “the next big thing,” offering businesses new opportunities to grow and change. They bring together far-flung facilities in a single, secure network and let people from all locations communicate as if they were in the same building. SDNs also create big challenges to IT and cybersecurity teams. Instead of securing one physical data center, they must now secure an increasingly large, complex and distributed network in a virtual environment.

Details