Hacker Series – Exit Strategy

hacker

Hacker Series – Exit Strategy OR…5 Ways To Keep Your Insides Inside I am a hacker and I am in your corporate computer network. The great thing about computer networks is all computers in the whole company are connected to every other computer. It’s also the bad thing. Because I was able to gain access […]

The End of Email?

Email

The End of Email? OR What Have You Done For Me Lately? 90% of breaches start with a phishing email. Some reports say half of all the world’s bandwidth is wasted on the transmission of spam and phishing emails. Imagine being in a sports car on the interstate and every other vehicle is a garbage […]

Ransomware Survival – Part 3

Cyber Lock

Ransomware Survival – Part 3 OR Live, Work, but Don’t Repeat I had to plug in my Serious Keyboard for this post. When the dust settles and some semblance of normality has returned, it is time to understand what happened, how it happened, and how to prevent or mitigate a repeat. However, many small to […]

Ransomware Survival – Part 2

Cyber Lock

Ransomware Survival – Part 2 OR The Unintended Vice of Ignorance WARNING: Due the seriousness of the material, stickers have been added to lighten the mood. The phone rings on Saturday morning. Why, it’s Marvin from the office, and he sounds nervous. He reports that a computer has a ransomware message on the screen and unconfirmed […]

Ransomware Survival – Part 1

Cyber Lock

Ransomware Survival – Part 1 OR, How I Learned To Stop Worrying and Love the Tape Part 1 – Intro and Prep Ransomware is probably the scariest and most disruptive thing an organization can face short of an IRS audit. Though you would be better off with the audit, as the typical ransom to release […]