<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699785206826853&amp;ev=PageView&amp;noscript=1">

How to Protect your Privacy from ISPs and Hackers

Posted by Christopher Jones on Mar 27, 2017 4:20:15 PM
Senate Passes Bill to Grant ISPs Permission to Sell Geolocation and Browsing History for Advertising.

In this digital age, anyone using Google or Facebook is used to having their information sold for advertising purposes. However, we give our consent for the companies to use this information. The US Senate recently voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies. This includes information such as geo-location data, financial and health information, children’s information, Social Security numbers, Web browsing history, app usage history, and the content of communications. This comes in the wake of an FCC decision to halt a data-security regulation that would have required ISPs and phone companies to take "reasonable" steps to protect customers' information from theft and data breaches. ISPs will be able to “draw a map” of where families shop and go to school, detect health information by seeing which illnesses they use the Internet to gather information on, and build profiles of customers' listening and viewing history. Privacy seems to have been a passing trend in our society. In this new world, where personal conversations, preferences, and browsing habits are all being recorded and sold, how do you protect yourself?

Read More

Topics: Cybersecurity, Infosec, vpn, privacy, tor, isp

What does Employee Apathy have to do with Cyber Security?

Posted by Stephen Abbey on Mar 24, 2017 5:58:38 PM

2017 Human security behavior is not improving even though information security and services spending is topping $81 Billion worldwide according to Gartner Research.


Read More

Topics: Ransomware, Cybersecurity, Infosec, Human Firewall

Cloudy with a Chance of Malware

Posted by Christopher Jones on Mar 21, 2017 3:17:49 PM

In 2015, millions of Weather.com visitors were exposed to malicious advertisements which exploited vulnerabilities in browsers or browser plugins to install malware on end users computers. This was the same group who had targeted Yahoo's network the same year and infected many millions of more users. Malvertising has become so prevalent and sophisticated that it doesn't necessarily require any user interaction to execute a payload. Advanced techniques like stegano or good old fashioned trickery like fake viruses or fake updates can cause serious harm to an organization. In a digital world where just visiting your favorite news or weather page can compromise your computer, how do you protect yourself?


Read More

Topics: Ransomware, Cybersecurity, Infosec, malvertising, ad networks, angler, stegano, click-fraud

Protect yourself from Zero-day Exploits

Posted by Christopher Jones on Mar 16, 2017 3:11:15 PM

The news has been full of stories regarding cyber security data breaches leading to massive dumps of zero-day exploits, inciting fear and confusion in the public without fully explaining the situation. An example of this is the recent Wikileaks Vault 7 dump of CIA hacking tools. Before that, it was The Shadow Brokers and Equation Group who leaked the NSA's Tailored Access Operations tools.What is ironic is that it wasn't a zero-day that was used to acquire these tools. It was a contractor who was responsible. Ultimately he was the pawn of higher level threat actors. How he was compromised is a subject of speculation.


Read More

Topics: Ransomware, Cybersecurity, Infosec, data breach, equation group, Zero-day, Vault 7, shadow brokers

Cyber Security State Data Breach Notification Laws are Criminal & Civil [Why you are Exposed]

Posted by Stephen Abbey on Mar 16, 2017 11:59:00 AM


Read More

Topics: Ransomware, Cybersecurity, Human Firewall

Ransomware 2017 - Get prepared or Get hacked!

Posted by Stephen Abbey on Mar 10, 2017 8:45:00 AM

Ransomware activity continues to exist, likely due to low overhead and a high investment return for the cyber criminals. Media coverage of successful attacks against Medical institutions and other affiliations in 2016 also show the threat is working.

Read More

Topics: Ransomware, Cybersecurity, Infosec, HealthIT, Human Firewall

Employees are the best offensive cyber security warriors.

Posted by Stephen Abbey on Mar 9, 2017 12:09:08 PM

Companies are fighting a cyber security war against highly arranged antagonists. Corporations still approach cyber security with a rigidly defensive mindset. They operate under the idea that having the safest defense will keep them safe from advanced rivals. But assailants understand how to break any defense, guaranteeing they will finally infiltrate a corporation. Businesses need to approach security by thinking about how they can stop an offensive attack. How is this different from having a robust defense? When you are stopping the attack, you do not stand on the sidelines waiting for an assailant to break your network, praying that the safety measures you have in place will be adequate to stop them. To stop an offensive play, you turn your people into offensive warriors: rather than protecting about your defensive weaknesses, you keep an eye open for the attacker's weak points and go after them to shut them down before they become a problem.

Read More

Topics: phishing, Cybersecurity, Infosec, Human Firewall

How to Create a Strong Cyber Security Passwords that are Easy to Remember

Posted by Philip Adikes on Mar 1, 2017 10:00:24 AM


Most internet users are lazy with their passwords.  They rarely update their passwords and reuse them across several different websites.  Developing good password habits can drastically reduce the chances of someone hacking into your online accounts.  It is important to use passwords that are difficult to crack, but it is also important to update them regularly.  Here are some tips and examples on how to develop your passwords.

Read More

Topics: Cybersecurity, passwords

What is the Human Firewall?

Posted by Philip Adikes on Feb 22, 2017 2:10:47 PM

The Human Firewall:


When most people think about information security, they think about all of the hardware and software that protects the data from outside eyes.  The greatest access point to this data is often overlooked: the employees of the company.  Simply put, building a human firewall is the practice of developing a security conscious mindset for all employees with access to sensitive information.  Reluctance to train employees this way is the reason why phishing remains the most common and successful tactic for attacking small businesses.

Read More

Topics: Cybersecurity, Human Firewall

Mal-advertising  What is it?

Posted by Stephen Abbey on Feb 13, 2017 9:01:00 AM
In 2016, Google disabled more than 1.7 billion bad ads, that is triple the bad ads Google took down in 2015 according to Google. Malware ads are a subset of the 1.7 billion ads.

Advertising online is straightforward – Any Business can just enroll with a network and then bid in real-time to have their ads appear on favored websites.

Any would be cyber predator can place Malware advertisements with Ad networks that have lax security policies. It gets even more tough to spot Mal Ads when Ad sellers don't always know the purchasers. Ad sellers are always looking for buyers, and in an attempt to get new buyers they make the obstructions to become a customer easy which makes it very simple to get into the Malicious Ad software business. Hackers play bait and switch games with advertisement networks where they publish good ads for a bit, and then they begin to insert malignant ads.

Drive-by downloads occur all of the time. Fundamentally, an infected ad uses an iframe or invisible website page. Once you visit the web page, you have started the exploit process which downloads malware into your computer. So after you visit the website page, you are then redirected to an exploited lander page, and now the exploit installs the malware. Seventy (70%) percent of malicious software is some form of ransomware.

Educating your employees is critical to protecting data loss. The Securable Perimeter system teaches your employees by regularly testing and present challenged fake mal-Ads. Our educational methods are real-time and train your staff to become the best Human firewall. 70% of all cyber security risks are with your people.
Read More

Topics: Infosec

The Human Firewall - Your first and best line of defense

Posted by Stephen Abbey on Feb 10, 2017 9:58:00 AM


Read More

Topics: Infosec

Shadow IT: Two Golden Rules

Posted by Stephen Abbey on Feb 9, 2017 10:52:50 AM

Shadow IT is rapidly expanding due to the proliferation of cloud productivity solutions. Employees are empowered to be more efficient which has transformed new cloud technologies into the organization right under the eyes of the IT department. In most situations, there is not any nefarious intentions by the business group desiring to employ unauthorized technology and applications as-a-service into the organization. They're just attempting to be as productive as practical, and they regularly see IT as a detriment to forward progress. A study carried out by Frost & Sullivan discovered that more than eighty percent of survey respondents said they are using non-approved SaaS applications in their jobs. Another report found that just 8% of firms know the boundaries of Shadow IT. Without correct education and controls, users can accidentally broadcast and store delicate business information into the cloud without any company stakeholder knowing about it. 

Read More

How big is your Digital FootPrint? 7 tips to protect it.

Posted by Stephen Abbey on Feb 5, 2017 5:05:08 PM

A digital footprint is data tracks that are left behind when you employ a digital service like visiting websites, or whenever somebody posts info regarding you onto a digital forum, for example, a social network like Facebook. You also have a Dark digital footprint, and this is where hackers sell your (PII) Personally Identifiable Information, like emails, passwords, social security numbers…etc. Having a digital footprint is ordinary, and they are awfully tough to avoid. Given that your digital footprint is in public accessible, we advocate you know what it like and the way to actively manage it. This work demonstrates what others can simply discover info about you through one or two fast net searches and recommend some straightforward methods to obstruct any person trying to target you or attack your internet accounts.

Everybody ought to have a view on how info regarding them and how their business is shared. Do your friends know your perspectives? Spend some time chatting with people who may exchange information regarding you or your employer to tell them your views.

While online, if you happen to detect something posted to you by a friend or teammate, consider asking them to get rid of it if you do not need it to be there.

If that is not possible it does not have to be a drama; understanding what other people know about you is a very positive step toward coping with any unintentional effects.

How large is your FootPrint?

See what info is available on the net about you, your company, your work, and your interests. Look for info that's freely published as well as info that is found to constrained groups. There are many ways to establish and protect your digital footprint.

Think how confident you are with this info being available on the internet and any potential security hazards it may pose to you or your organization. If possible, reduce or remove any info posted on sites you know don't use.

It is insufficient to make your profile on one social networking website utterly personal if another account lists all your private information. If you see anything posted online that is non-public, take screen captures as proof to use when approaching the site directors to have it removed.

Some tips

1.As a preventative measure, consider removing yourself from direct selling databases.
2.Remove metadata from photos before you post them online
3.Shield your telephone number
4.Check privacy options continually and change them from their standard settings
5.Keep passwords safe
6.Compartmentalize your ( digital ) life - Don't give social media programs access to your telephone or email
7.Do not make your device’s easy for others to access.

Read More

Topics: Infosec

Shadow IT- Protect your business

Posted by Stephen Abbey on Feb 5, 2017 2:07:08 PM

Permitting Shadow IT to proliferate outweighs the savings of doing nothing. To stop an upcoming security issue, there are a selection of methods that can do the job, each with cost and benefit tradeoffs.

Read More

Topics: General Cybersecurity

How to recognize Phishing email messages & Websites

Posted by Stephen Abbey on Feb 5, 2017 1:20:53 PM
Phishing e-mail messages and web sites are built to monetize weak humans. Cybercriminals can do it by faking a email, installing malignant software on your computer or taking private info off your PC.


Read More

Topics: phishing

Helpful Tips to Protect Yourself Against Phishing Scams

Posted by Stephen Abbey on Feb 5, 2017 12:58:05 PM

Phishing cons come in a variety of shapes and sizes. But one thing is definite: they are everywhere. Scammers who craft and propagate these fake emails are typically experienced in their method, incorporating unusual items,e.g., the Flu onset and the coming vacation season into their ploys to maximize their appeal.

Today, phishing tricks have no limits when referring to the kind of computer we use or the kind of perpetrator, whether it be a Laptop, Smartphone, or IPad, each user is at the mercy of Phishing. In a study performed by Google, the company revealed that the most expertly made strings were lucky forty-five (45) percent of the time.

Also, even the ones that were manifestly fake, as demonstrated by misspelled words and poor grammar, worked on over 10% of the users. Phishing remains leveraged by villains as a 'tried and true' method of cheating everyday users and organizations. Many companies have developed anti-phishing answers to protect firms when, not if, a worker clicks on a malignant link. Securable Perimeter tools are comprised of monitoring, predictive modeling, and employee testing features to teach you how to protect the company assets before the Phish wreaks too much havoc on your firm's network.

But this is part of the battle. Phishing inherently plays on human curiosity and weakness. As such, any anti-phishing plan must incorporate a degree of security awareness like Securables Human Firewall. We published a few pointers to help spot a "real" phish from a "bad" one. To resume our effort of bringing anti-phishing awareness, particularly with the vacations approaching. In the end, phishers could be smart with their methods to fool users into clicking on a dubious link. But when competing against a healthy dose of SECURABLE PERIMETER security awareness, they do not have any chance.

Read More

Topics: phishing

Better Business Bureau warns of QuickBooks phishing scam

Posted by Stephen Abbey on Feb 5, 2017 12:21:42 PM

The Better Business Bureau Northwest is sounding the alarm about a new email phishing scam targeting users of Intuit’s QuickBooks accounting software.

Read More

Topics: phishing

3 Cybersecurity tips to protect your Mobile Workforce

Posted by Stephen Abbey on Feb 5, 2017 12:24:34 AM



Many business forget that their empolyees go home at night and have huge security issues. They typicsallyuse the default configurations for there network setup ( admin, admin) . This is a big No-No as any hack can easly walk into your busienss from your mobile workforce.

Read More

Topics: phishing

How-To Create the Best Passwords for Business users

Posted by Stephen Abbey on Feb 5, 2017 12:13:55 AM


Step 1: Getting Started


To keep things simple, we recommend that our clients replace certain letters with symbol codes. You can do more than we suggest but here are a few that are easy to remember. – When creating a password, replace any vowel (AEIO) with the symbols listed below. Also, it is important to make sure you use the space bar between words as it increases the complexity.

Read More

Protect your business from Phishing scams

Posted by Stephen Abbey on Feb 4, 2017 11:59:26 PM

Protect your business from Phishing scams part 1 of 3

Educate employees on what phishy emails look like, and make sure they know which ones to avoid opening. Remind employees to never open attachments from unknown senders and to never provide sensitive business data to unfamiliar individuals outside the company. Spell out what information is and is not acceptable to divulge over the phone, in an email, or in-person to those of unfamiliar status within the organization and outside the company.

Read More

Topics: spear phishing