Episode 33: Small Business Security Strategy

Episode 33: Small Business Security Strategy
Are you chasing the latest bugs and vulnerabilities, or does your small business have an IT security strategy? Listen in this week to get started on implementing a tried-and-true security strategy to protect your digital stuff. Links Best practices for passwords updated after original author regrets his advice (Verge) NIST’s new password rules – what ...

When Employee Termination Goes Wrong

When Employee Termination Goes Wrong
This week a man in Arlington, TN – just around the corner from me in Memphis – was sentenced to 18 months in prison with two years of supervised release for accessing his former employer’s computer system, pilfering competitive information for his new employer.  Court documents showed he accessed a compromised email account that allowed ...

Security Controls 101 – What You Don’t Know CAN Hurt You; Inventory Your Software

Security Controls 101 - What You Don’t Know CAN Hurt You; Inventory Your Software
In my last blog post I told you why it’s important to know what’s on your network and why it matters. But knowing what devices are connected isn’t enough. You have to know what’s on those devices. What software is installed? What version? What have your users installed that you don’t know about? Who cares? You ...

Security Controls 101 – What You Don’t Know CAN Hurt You; Find Out What’s On Your Network

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzo, The Art ...

New Global Ransomware Attack

New Global Ransomware Attack
If you haven’t heard yet, there’s yet another global ransomware attack spreading around the globe. As of right now (1:40 pm CST) there doesn’t seem to be a consensus on what type of ransomware it is. Some are claiming it’s a modified version of the Petya ransomware strain, yet others are saying it’s a new ...

Episode 32: Doesn’t It Make You Wanna Cry?

Episode 32: Doesn't It Make You Wanna Cry?
Yet another ransomware outbreak. Were you prepared for Wanna Cry? Will you be prepared next time? In this episode we do a post mortem of the Wanna Cry ransomware outbreak and give you strategies to protect you from this, and similar outbreaks. Notes from this week’s podcast Disable SMBv1 Using Group Policy UPDATE (6/20/2017): We ...

IoT Security is Important To Everyone—What You Need To Know

IoT Security is Important To Everyone—What You Need To Know
The Largest DDoS Ever On September 20, 2016, the largest¹ ever DDoS attack, took place against Brian Krebs. A significant thing about this attack, other than being the largest ever, was the vector, IoT devices. Hundreds of thousands of IoT devices, referred to as an “army of a million hacked devices,” including network-connected webcams, closed-circuit cameras, DVRs, and ...

30: IDS Is Not Dead

30: IDS Is Not Dead
An IDS is one of the most valuable tools we use to secure small business networks. What is an IDS? Are they still useful? How can you use one in your business? We’ll answer these questions in this episode of the Tech Tip Podcast. Links Security Onion Web Site (From the web site) Security Onion ...

29: Trust But Verify

29: Trust But Verify
Trust is the glue that holds society together. But it’s also what allows criminals and con men to take advantage of us. This week we’ll give you some tips on how you may be placing trust in the wrong people or technology, and help you verify that trust is well-earned. Events (new!) Small Business Ransomware ...

Removing Malware—A Step By Step Guide For Microsoft Windows

Removing Malware—A Step By Step Guide For Microsoft Windows
Word Of Warning No matter how hard you work at securing your small office/SOHO network and computers—someone, somehow, somewhere will unknowingly allow malicious malware into the system. The chances of recovery are better if you have planned for this scenario and are prepared to respond quickly. This post serves at least two purposes, first helping ...