SME Cyber Security
83.4K views | +0 today
Follow
 
Scooped by Roger Smith
onto SME Cyber Security
Scoop.it!

And the Darwin Award for Cyber Security Goes to... Sony!

And the Darwin Award for Cyber Security Goes to... Sony! | SME Cyber Security | Scoop.it

Om When it comes to Password Security 101, Sony's IT cyber security team's incompetence is so egregious, it's deserving of a Darwin Award.

Roger Smith's insight:

OK

more...
No comment yet.
SME Cyber Security
Your new post is loading...
Your new post is loading...
Scooped by Roger Smith
Scoop.it!

Govt finally reveals how it plans to target encryption - Security - Telco/ISP

Govt finally reveals how it plans to target encryption - Security - Telco/ISP | SME Cyber Security | Scoop.it
Will involve weakening the security of services.
Roger Smith's insight:

What a load of crap - "The mere fact that a capability to selectively assist agencies with access to a target device exists will not necessarily mean that a systemic weakness has been built," the government argued

 

This is not weakening encryption? - " “The Australian government has no interest in undermining systems that protect the
fundamental security of communications,” it said." 

 

This will impact the other 99.999% of the users of the digital world

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

For just $10, a hacker can attack your business via RDP: Here's how to stay safe

For just $10, a hacker can attack your business via RDP: Here's how to stay safe | SME Cyber Security | Scoop.it
RDP access is being used as an entryway for hackers. Be careful yours doesn't end up for sale on the Dark Web.
Roger Smith's insight:

If you are using RDP to access your organisation you need to make it more secure. 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info | SME Cyber Security | Scoop.it
The thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics.
Roger Smith's insight:

Social enginering!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

The Biggest Risk to Your Business: Inadequate Cybersecurity

The Biggest Risk to Your Business: Inadequate Cybersecurity | SME Cyber Security | Scoop.it
You wouldn't leave the doors to your business unlocked overnight, so why would you consider taking risks when it comes to your cybersecurity?
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Possible Data Breach at Adidas Could Impact Millions of U.S. Customers | SecurityWeek.Com

Possible Data Breach at Adidas Could Impact Millions of U.S. Customers | SecurityWeek.Com | SME Cyber Security | Scoop.it
Adidas is investigating a possible data breach that may have resulted in the information of millions of US customers getting stolen
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Best Cyber Security Practices for Your Company

Best Cyber Security Practices for Your Company | SME Cyber Security | Scoop.it
Think about your business. Is your most sensitive data totally secure? If it’s not, it’s time to step it up.
Roger Smith's insight:

Easy to understand strategies, will make your organisation more secure

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

BMW cars found to contain more than a dozen flaws

BMW cars found to contain more than a dozen flaws | SME Cyber Security | Scoop.it
China-based researchers are working with the carmaker to patch the security problems.
Roger Smith's insight:

Only BMW's, I don't think so!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

5,000 Routers With No Telnet Password. Nothing to See Here! Move Along!

5,000 Routers With No Telnet Password. Nothing to See Here! Move Along! | SME Cyber Security | Scoop.it
A Brazilian ISP appears to have deployed routers without a Telnet password for nearly 5,000 customers, leaving the devices wide open to abuse.
Roger Smith's insight:

A- what is wrong with manufacturers?


B- why is security the last thought?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Phishing is the leading cause of cyber attacks –

Phishing is the leading cause of cyber attacks – | SME Cyber Security | Scoop.it
Criminal hackers are starting to rely more heavily on nuanced social engineering attacks such as spear phishing, a new study has found.The 2018 Trustwave Global Security Report shows that phishing…...
Roger Smith's insight:

Still targeting the weakest link - US

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Nine Things That Are Poised To Impact Cybersecurity

Here's what's being developed to protect your organization.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Survey says: Many breaches accomplished in less than an hour

Survey says: Many breaches accomplished in less than an hour | SME Cyber Security | Scoop.it
Penetration testers and hackers are having little problem breaching the perimeter and quickly locating critical data with 12 percent saying they can get in
Roger Smith's insight:

"Fifty-seven percent of the testers and hackers surveyed did note that those companies that are in compliance with PCI, NIST and ISO 27001 are better protected, calling all three defensive measures effective."

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Facebook Is Not The Only Company Watching You

Facebook Is Not The Only Company Watching You | SME Cyber Security | Scoop.it
Facebook isn’t the only company that’s had trouble with authorities over breaches of privacy.
Roger Smith's insight:

I was wondering when the others were going to be mentioned in this.   Google and Android are collecting more information and using it in their algorithyms, maybe they are not selling it?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Atlanta's Boring Ransomware Cyberattack

Atlanta's Boring Ransomware Cyberattack | SME Cyber Security | Scoop.it
A recent ransomware attack on Atlanta’s computer systems is disruptive, but so ordinary.
Roger Smith's insight:

Nice, a sarcastic look at an everyday computer failure.   Is it all so normal?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Telstra Data Breach - A Website Error Exposed Customers' Information Online

Telstra Data Breach - A Website Error Exposed Customers' Information Online | SME Cyber Security | Scoop.it
A website flaw resulted in Telstra data breach reported by a non-technical user. The site showed thousands of customers' details online in search results.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Use These Frameworks to Establish GDPR Security Controls

Use These Frameworks to Establish GDPR Security Controls | SME Cyber Security | Scoop.it
When it comes to complying with the General Data Protection Regulation (GDPR), a common struggle organizations face is how to establish “what right looks like” in the absence of a checklist or prescriptive instructions.
Roger Smith's insight:

Any framework will do it, or a combination of a number of them, but FFS just start somewhere.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

OK, We Are Bad At Cybersecurity -- Now What?

OK, We Are Bad At Cybersecurity -- Now What? | SME Cyber Security | Scoop.it
Here's how we can help avoid self-inflicted cybersecurity wounds.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

A new malware, an old flaw, and social media as a weapon | Avast

A new malware, an old flaw, and social media as a weapon | Avast | SME Cyber Security | Scoop.it
Smoke Loader uses a new injection technique, Hamas uses social engineering on IDF, and a Facebook bug causes unblocking.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Many companies are not GDPR-compliant: report

Many companies are not GDPR-compliant: report | SME Cyber Security | Scoop.it
Strengthening cyber security while managing operational risk and compliance are two biggest priorities...
Roger Smith's insight:

The numbr of SME’s who are not compliant is even higher.  Compliance streamlines an organisaion allowing it to grow with a stable environment and not have to have knee jerk reactions to every piece of bad digital news.   SME’s are still focused on “she’ll be right”

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

i-Tech: DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide

i-Tech: DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide | SME Cyber Security | Scoop.it
DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide Widespread routers' DNS hijacking malware that recentl
Roger Smith's insight:

I love it when you point out an issue with the digital world and get howled down, only to be vidicated because the bad guys have shown how it can be done.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Maker of iPhone Hacking Tool Suffers Data Breach, Extortion Threats

Maker of iPhone Hacking Tool Suffers Data Breach, Extortion Threats | SME Cyber Security | Scoop.it
Grayshift, the company that makes an iPhone hacking tool called GrayKey, is already being targeted by malicious entities.Last week, unknown attackers leak...
Roger Smith's insight:

I am clever enough to be able to by pass apple iphone security but do not worry about their own supply chain.   FAIL

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How can lawyers find cybersecurity solutions that work for them?

How can lawyers find cybersecurity solutions that work for them? | SME Cyber Security | Scoop.it
Description...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

NHS is “not alone” in its inertia post-WannaCry, says cybersecurity chief

NHS is “not alone” in its inertia post-WannaCry, says cybersecurity chief | SME Cyber Security | Scoop.it
“The Public Account Committee’s report into the NHS WannaCry cyber-attack highlights a lack of preparedness for attacks of this nature, but the NHS is not alone in this,” said Andrew Beckett, managing director of Kroll’s cyber security and investigations division.
Roger Smith's insight:

Patching  is one of the best protections

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyber Accountability: The Next Boardroom Struggle

Cyber Accountability: The Next Boardroom Struggle | SME Cyber Security | Scoop.it
Working in cyber security means reaction and flux. The reality of the role is responding to an ever-changing landscape of cyber threats that are increasing.
Roger Smith's insight:

The change in board room management of cyber events needs to be addressed especially with GDPR.   This explains some of the changes that need to be addressed at the board level

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

China's "Social Credit System" Rates How Valuable You Are as a Human

China's "Social Credit System" Rates How Valuable You Are as a Human | SME Cyber Security | Scoop.it
China's plans for a "social credit system" are in full swing. The government has already tapped private companies for pilot runs
Roger Smith's insight:

This is truly frightening!

more...
No comment yet.