• Oct 13
    2015
    October is National Cyber Security Awareness Month (NCSAM), and this week's theme is "Connected Communities: Staying Protected While Always Connected." These days, many of us live a major portion of our lives online. We shop online, bank online, play games online, work online. We are in almost constant contact with friends and family through email, texts, and social media like Facebook and Pinterest. It’s important to remember, however, that as ...
  • Oct 06
    2015
    For the 12th year, October is National Cyber Security Awareness Month (NCSAM). NCSAM was created by the National Cyber Security Alliance and the U.S. Department of Homeland Security as a collaborative effort between government and industry to ensure that everyone has the resources needed to stay safer and more secure online. The urgency increases every year. Each week of NCSAM has a theme, and this week’s theme is “Creating a ...
  • Sep 29
    2015
    I have posted before about how cybercrime has changed. In the old days, the criminals worked somewhat feverishly to breach your network and then make off with, in a manner of speaking, as much data as they could carry. But these days, they are patient. Through phishing expeditions and social engineering, they plant bits of malware in your network and ultimately this malware makes an opening they can exploit more ...
  • Sep 22
    2015
    Logical Operations has become a Champion of National Cyber Security Awareness Month (NCSAM) 2015, and I have been poking around the website of the National Cyber Security Alliance as well as those of our fellow Champions. I am astonished at the amount and quality of free resources available to businesses that want to protect themselves from cyber crime. The Alliance, for example, sponsors a site called StaySafeOnline.org with resources for ...
  • Sep 15
    2015
    I have written before on this blog about the risk companies face from their own employees. The insider threat is growing, and some even now believe the Ashley Madison hack had insider involvement. That's why I decided to dig out a 2012 report published for the U.S. Department of Homeland Security on the insider threat in the financial services sector. (The link is a PDF of the report located at ...
  • Sep 09
    2015
    In 1950, American engineer W. Edwards Deming gave a speech to Japanese industry leaders on "Statistical Product Quality Administration." The legend is that the Japanese were inspired to re-examine their manufacturing processes. The result was a manufacturing revolution which led ultimately to Japanese domination of so many world markets in manufactured goods. Not to oversimplify Deming’s work and philosophy (you can learn more about it at the Deming Institute web ...
  • Sep 08
    2015
    The Black Hat conference is the world's premier cybersecurity conference, and this year for the first time, conference organizers did a survey of participants (note: the link is a PDF file). In effect, it is the view of 460 of the business world's most security-savvy professionals, nearly two-thirds (64%) of whom work at companies with 1,000 or more employees. Asked what three threats were of greatest concern, the largest group ...
  • Sep 01
    2015
    Cybersecurity standards are in the new. Last week Wyndham Worldwide has lost an argument in court with the U.S. Federal Trade Commission. Wyndham suffered data breaches in 2008 and 2009 that resulted in more than $10.6 million in fraudulent charges to consumers. In 2012, the FTC filed a suit against the company, saying it had “unreasonably and unnecessarily exposed consumers’ personal data to unauthorized access and theft.” Wyndham defended itself ...