Category Archives: Cyber security

The CISSP Exam Update and Eight Domain Rewrite for 2015

For individuals considering the (ISC)² CISSP exam, you need to be aware of a major update that will go into effect April 1, 2015.  Gone are the ten domains that have been with us for many years. Here are the … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Research Shows Businesses are Prime Targets for Cybercrime

High profile security breaches such as Target, Snapchat, and Neiman Marcus often make headlines. However, research shows that both large and small businesses are targets of cybercrime. Verizon published a data breach investigations report that looked at 621 confirmed incidents … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

Did “Russian speaking operatives” create the Red October malware to invade specific organizations’ computers, networks and smartphones?

Last October, a world-name in IT anit-virus security and research, Kaspersky, revealed the workings of five-year old malware program hitting on networks throughout “diplomatic, governmental and scientific research organizations,” according to a post on SecureList.org, “The Red October Campaign…An Advanced … Continue reading

Posted in Cyber security, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Ramping up cyber security means shutting down Botnets

It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 2)

In our last article, we talked about how having a social media account can leave you exposed to potential hacks from cybercriminals who are looking to take advantage of your friends and followers for scams and spam. Now, let’s examine how the material you post online can be used against you by these same cybercriminals. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 1)

In this first of two articles, we will take a look at how your social media can be used by hackers and why it is so vulnerable. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

What To Do When You’ve Been Hacked?

It is imperative that you know exactly how to deal with a cyber security hack attack on your system. Having a plan in place ahead of time will prevent fumbling and confusion in the event that a hack does take place. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , | Leave a comment

Is Bringing Your Device to Work a Good Idea?

Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading

Posted in Cyber security, IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , | Leave a comment

IT Security Jobs — High Demand, Low Supply

Recent reports show that supply for the high demand IT Cyber security jobs needed for business today is simply not there. We explore this in our latest blog. Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Tagged , , , , | Leave a comment