On December 6th, Kevin Hyde, Managing Director of Layer 8 Security was the guest lecturer at UBS Financial Services Inc.’s ultra high net worth individual meeting on cybersecurity. Kevin provided practical security training to using scenarios executives can imagine themselves in as they encounter their work and personal lives. The training detailed the nature of the current threat landscape, ways in which attackers gather information on targets, and the different methods used to exploit this information. Executives were also given [...]
New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]
FISSEA Conference 2016 – The Quest for the Un-hackable Human: The Power of Cybersecurity Awareness and Training
Two weeks ago, our Managing Director, Kevin Hyde, and I attended the Federal Information Systems Security Educators' Association (FISSEA) annual conference at the NIST campus in Gaithersburg, MD. The theme for this year's conference was "The Quest for the Un-hackable Human: The Power of Cybersecurity Awareness and Training". Here are some of my thoughts from the event: Civilian government agencies are creating cyber hygiene* training programs for its employees. One of the key principles we emphasize during our information risk [...]
I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]
PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator firstname.lastname@example.org December 11, 2015 Exton, Pennsylvania - Jeff Lipson, Executive Director of Layer 8 Security, and Dave Heilig, Software Solutions Director of Layer 8 Security, attended the annual Union League's Dining Out event at the Union League of Philadelphia. Proceeds from the event were donated to Philadelphia veterans. The guest of honor, pictured above with Jeff and Dave (left and right, respectively), was General Carter Ham, US Army (Ret). "It is an honor [...]
And, would you care to guess who your weakest link is, in terms of maintaining good security? According to a recent study, those folks most often tasked with keeping things secure for the enterprise, are also actually the ones most likely to cut corners themselves. When I saw that, I initially wanted to be stubborn and deny it was possible. But after a quick thought, I realized it was more than likely spot on. Think about it. When the company [...]
Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!
Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!
I’ll give you a taste of the NIST Cybersecurity Framework Audit. This is question 4 of 99 asked in the CSF Audit: “ID.BE-4: Dependencies and critical functions for delivery of critical services are established” – In other words, what services do you need to operate your business, and oh by the way, which businesses out there rely on you to conduct their own business? So the third-party vendor vulnerability has become HUGE. This is the reason almost half of our [...]