Phishing: Are you a Suckerphish if you fall for the bait?

By |June 22nd, 2016|Insider threat, KSE, SMB, TUX GUI|

A previous version of this was previously posted in October, 2014.   Previous posts on phishing, here, and here, discussed factors that might reduce the effectiveness of user  security awareness training to protect against phishing. We're not saying that awareness training can't help to some degree, possibly for tightly defined business procedures and processes with enforced

PHISHING: Doomed to be a Phool?

By |June 20th, 2016|Insider threat, KSE, SMB, TUX GUI|

Phishing attacks have become pervasive, sophisticated, insidious, and more complicated. Unfortunately, these increasingly dangerous attacks are targeting some supposedly hapless chumps collectively known as users (in the eyes of some IT and security folks).  I think that security awareness training has been the only game in town, for the most part. The most recent Verizon DBIR revealed

PHISHING: fool me once … is still all it takes!

By |June 19th, 2016|Uncategorized|

(Original version posted 2014/10/19)   We know that phishing, a form of social engineering or con game played on email game boards, is still growing as a problem. The Verizon Breach Report investigations continually reveal phishing as a main method and point of network entry in breaches. One should remember that, even though the success rate is

SMB-Friendly Cyber Security Post Index

By |June 14th, 2016|KSE, SMB, TUX GUI|

Index of SMB posts. Extra effort has been made to keep the following posts as free of technical jargon, as possible. Many Trustifier posts are written at a high general level, so you may wish to check some of the others out at your convenience.   Plight of the SMB Cyber Defender Series   SMBs may

SMB cyber security: series wrap-up

By |June 12th, 2016|Insider threat, KSE, TUX GUI|

SMB Security Simplified Although awareness is improving, there's still a long way to go for SMBs to protect themselves adequately. SMBs who may be at most risk from an attack, have limited resources and options. There is a need to start doing something. TUX AI has been designed to deliver bundled, comprehensive protections for SMBs,

SMBs, you do have data assets to protect!

By |June 9th, 2016|SMB, TUX GUI|

Consider these possible data targets. SMB Security Simplified  Many SMBs don't invest in protecting their data because they undervalue it. A self-assessment of the data used in business activities might confirm whether one's cyber security investment assumptions are correct. Three categories of data are business intelligence, personal and private data, and trade secrets and intellectual

KSE is a Reference Monitor

By |June 8th, 2016|Insider threat, KSE|

Has the reference monitor gone the way of the Dodo Bird? - Well, no.   I blogged here about the significance of NIST sp800-160. The goals and objectives of this initiative are worthwhile and necessary; NIST has recognized the need to build more secure systems. The full title of the document is; "Systems Security Engineering: Consideration