0

Is obsolete the new secure?

Posted by Josh on June 17, 2014 in Security |

I recently read an article in Defense Systems Magazine that toyed with the idea of using what most would consider obsolete technology as a “security” measure.   In this case they were specifically talking about the use of 8-inch (yes, you read that right) floppy disks that hold about 1 to 1.2 megabytes of data.   […]

Tags: , , , , , ,

0

Passwords

Posted by Josh on May 21, 2014 in Security |

Tags: , ,

0

The Death of Windows XP… XPocalypse

Posted by Josh on May 1, 2014 in Security |

On the 8th of April 2014, Microsoft effectively “pulled the plug” on its decade plus old operating system Windows XP.  What this translates to for end users is fairly simple.  Their Windows XP computer won’t stop running, but any future security issues that are identified with the Operating System will not be fix via a […]

Tags: , , , , , , ,

0

Online Privacy: Is it real?

Posted by Josh on November 20, 2012 in Security |

  Online Privacy, to a large degree is a myth that we tell ourselves exists to ease our minds about the various things we do and place in to the ether of the beast called the Internet. The largest problem with the Internet and the concept of privacy is how the Internet works. As an […]

Tags: , , , ,

0

Social Media and Security

Posted by Josh on November 8, 2012 in Security |

When people think of social media and security, they often focus on the security of the particular social media site they are using.  Whether it is Facebook, Twitter, FourSquare, or any of the vast number of social media sites, the site itself is not your only concern.  You might be your biggest security threat! You […]

Tags: , , , , , ,

0

More Social Engineering

Posted by Josh on October 1, 2012 in AFCEA, Security |

Here is a great write-up of my August Continuing Education Lunch and Learn Program.   AFCEA Signal Magazine

Tags: , , , , , , , ,

0

The Lost Art of Physical Security

Posted by Josh on August 26, 2012 in Security |

  When you read about IT security, you see lots of hype about Operating System security, application security and various types of encryption.  What is often left out is the concept of physical security. You might ask what physical security is and it is a good question!  Physical security, as it applies to Information Technology, […]

Tags: , , , , , , , , , , ,

0

Own the Email, Own the Person

Posted by Josh on August 21, 2012 in Security |

This article by Dennis Fisher is a great piggy back on my Password Security  and Social Engineering articles. For attackers looking to take control of a victim’s online presence, there is no better place to start than the target’s email account. If you own the email, you own the person. That’s never been more true than today, with […]

Tags: , ,

0

The Mobile Device Dilemma

Posted by Josh on August 13, 2012 in Security |

Within the US particularly and most “first world” countries, we live in societies of “always on” and “always connected” for both personal and our professional lives.  While this 24×7 connection allows for greater productivity and hyper-connectivity, it is not without its own pitfalls.    From both a personal and professional standpoint we must take a […]

Tags: , , , , , , , , , , , , , ,

0

The WiFi threat is real

Posted by Josh on August 5, 2012 in Security |

One of the most common threats to a computer user’s security is something that has been widely adopted by businesses and home users alike.  Wireless internet connections, also known as Wi-Fi, has made connecting you computing devices to the internet easier in a wide range of locations.  The same technology that allows you to connect […]

Tags: , , ,

Copyright © 2012-2017 All rights reserved.

SiteLock