PHISHING: fool me once … is still all it takes!

By |June 19th, 2016|Uncategorized|

(Original version posted 2014/10/19)   We know that phishing, a form of social engineering or con game played on email game boards, is still growing as a problem. The Verizon Breach Report investigations continually reveal phishing as a main method and point of network entry in breaches. One should remember that, even though the success rate is

Cyber Security: Recap – Defender Advantage?

By |April 19th, 2016|Uncategorized|

<Added July 26/16 - The hackathon challenge is complete, and none of the participating Red Teams were successful.>   The Trustifier GOV2COM Hackathon 2016, - the "Irongoats Initiative", otherwise known as, "Exe..cuse me, your dirty bits are way too close to my MMU"  is getting going this week. The challenge is set up as a 2-month  (real-time) role-playing scenario

The 5 stages of cyber security adapt or die

By |April 10th, 2016|Uncategorized|

Replay: Ransomware Rapidware Edition Previously posted 2015/01/06   I once noticed an article called the “The 5 Stages of Security Grief” in (In)secure over at Help-Net Security. The author based his article on the ” 5 Stages of Grief” model by Dr. Kubler-Ross, which framed the series of emotional stages experienced when faced with impending death

Ransomware: The PIT and the Pendulum

By |April 8th, 2016|TUX GUI, Uncategorized|

Ransomware Ascending - Part 3 SMB Security Simplified Ransomware is a PIT, a Prevalent, Increasing, Threat. Ransomware is virtually impossible to defend against once it infiltrates networks. Many don't do proper data backups, or do them well enough. Questions are raised about future data backup and restoration requirements. The pendulum is swinging towards prevention, as

Ransomware Ascending – Part 2

By |April 5th, 2016|Insider threat, KSE, Uncategorized|

SMB Security Simplified Despite a number of wake-up calls, the infosec industry has not provided better defensive capability to businesses. Ransomware is in the process of becoming the greatest cyber crime epidemic ever. Risks tend to be underestimated, and protections are overestimated. The ransomware model of cyber crime is the current spotlight example of attacker advantage!

Adversaries got attitude – Ransomware

By |April 3rd, 2016|Uncategorized|

Defenders get platitudes In light of the burgeoning ramsomware cyber crime epidemic, here's a replay of a post from a few years back.   Brian Krebs broke the news of more retail chain breaches last month and discussed one in the post  “Breach at Goodwill Vendor Lasted 18 Months”. He wrote that the Goodwill was breached

Ransomware Ascending – Part 1

By |March 29th, 2016|TUX GUI, Uncategorized|

Ransomware: Could be It's a game changer   SMB Security Simplified While this post is part of our SMB and small business defender series, posts on the ransomware epidemic are for the interest of everyone. Ransomware is poised to become the greatest cybercrime epidemic ever. SMBs should not assume they will not be targets of ransomware attack,