SMBs: Myth-informed about cyber attacks?

By |April 25th, 2016|SMB, TUX GUI|

SMBs are myth-ing the point; cyber criminals aren't missing them!   SMB Security Simplified  Many small businesses believe they are too small, or uninteresting to anyone, to be a target of cyber attack. Unfortunately, this is and always has been, a myth, a bad assumption, a rationalization, or any combination. To attackers and cyber criminals,

Cyber Security: Recap – Defender Advantage?

By |April 19th, 2016|Uncategorized|

<Added July 26/16 - The hackathon challenge is complete, and none of the participating Red Teams were successful.>   The Trustifier GOV2COM Hackathon 2016, - the "Irongoats Initiative", otherwise known as, "Exe..cuse me, your dirty bits are way too close to my MMU"  is getting going this week. The challenge is set up as a 2-month  (real-time) role-playing scenario

TUX AI and KSE Ransomware Prevention

By |April 14th, 2016|Fahrenheit, Insider threat, KSE, TUX GUI|

Ransomware Ascending - Part 4   SMB Security Simplified The ransomware problem continues to explode. Infosec, business and government are struggling to find solutions. There is debate about whether to pay ransom, it often hinges on whether one has data backups. KSE adds controls on the systems where ransomware attacks are attempted, stopping them. TUX

The 5 stages of cyber security adapt or die

By |April 10th, 2016|Uncategorized|

Replay: Ransomware Rapidware Edition Previously posted 2015/01/06   I once noticed an article called the “The 5 Stages of Security Grief” in (In)secure over at Help-Net Security. The author based his article on the ” 5 Stages of Grief” model by Dr. Kubler-Ross, which framed the series of emotional stages experienced when faced with impending death

Ransomware: The PIT and the Pendulum

By |April 8th, 2016|TUX GUI, Uncategorized|

Ransomware Ascending - Part 3 SMB Security Simplified Ransomware is a PIT, a Prevalent, Increasing, Threat. Ransomware is virtually impossible to defend against once it infiltrates networks. Many don't do proper data backups, or do them well enough. Questions are raised about future data backup and restoration requirements. The pendulum is swinging towards prevention, as

Ransomware Ascending – Part 2

By |April 5th, 2016|Insider threat, KSE, Uncategorized|

SMB Security Simplified Despite a number of wake-up calls, the infosec industry has not provided better defensive capability to businesses. Ransomware is in the process of becoming the greatest cyber crime epidemic ever. Risks tend to be underestimated, and protections are overestimated. The ransomware model of cyber crime is the current spotlight example of attacker advantage!

Adversaries got attitude – Ransomware

By |April 3rd, 2016|Uncategorized|

Defenders get platitudes In light of the burgeoning ramsomware cyber crime epidemic, here's a replay of a post from a few years back.   Brian Krebs broke the news of more retail chain breaches last month and discussed one in the post  “Breach at Goodwill Vendor Lasted 18 Months”. He wrote that the Goodwill was breached