September 24, 2015
You’re an IT expert, department head, and management guru. You eat complications for lunch and challenges for dessert, but have you ever really gotten that stellar mind of yours around budgeting? You know about the known knowns, and the known unknowns can be accounted for, but that last category of unknown unknowns stumped even Dick Cheney. And the unknowns in the IT space get more complex every day. (more…)
September 19, 2015
In 1985, when IT was an emerging career track and Steve Jobs was resigning from Apple, the British sent Katrina and the Waves across the big pond, walking on sunshine. Fast forward 20 years and we encountered a completely different Katrina and much bigger waves, leaving folks stranded on rooftops and walking on the Superdome. Who knew popular music could be so prescient? (more…)
September 15, 2015
The last several months have seen an increase in the reported breaches of government or related networks. The University of Virginia network was breached recently by Chinese hackers, mainly, it is thought, because of their connection to DoD, Intelligence, and other government contractors, programs, and facilities.
Government contractors seem especially vulnerable these days, particularly to APTs, so let’s take a look at this threat with fresh eyes. (more…)
September 9, 2015
Imagine your life as a conservative, family values politician, or maybe even a minister, leading a flock of faithful men and women, your devoted wife at your side and pictures of the children on the desk behind you. That’s the “Before” picture, the one you see in your mind before the Ashley Madison hack and data dump, before the world connected your name and address and, in some cases, your most intimate details with the online presence designed to optimize invisibility. The “After” picture? Well, that one’s still in process, but the smiles evaporated quickly, and it’s an image that’s likely to stick with you for a long time. (more…)
August 29, 2015
In response to the ever-increasing number of high-profile cybersecurity breaches, The White House has formed the Cyber Threat Intelligence Integration Center to coordinate cyber threat data and assessments. Regardless of your position on government intervention, the move reflects a heightened national awareness of the pervasive nature of cyberthreats in our world. (more…)
August 25, 2015
Boys (and Girls) of Summer
Summer’s almost over. The kids are making their way back to school, and the parents are breathing a sigh of relief. Time has flown over the last three months, leaving in its wake a sandy, chlorine-smelling, airplane-riding, summer-camping, barefooted, late-sleeping bundle of teenage angst. Good times, am I right? But while time has flown by, you may have noticed that none of the lawn furniture or street signs or mobile homes have. Flown by, that is. Because we have had a relatively mild hurricane season so far. Well, last winter was mild too, until January checked in. (more…)
August 22, 2015
Your business has been rocking along, but the tide of change is rising. Maybe your stellar sales team has lined up a truckload of projects and you’ve got to expand your network. Maybe you’re facing an ownership change and need to make the upgrades the previous owners didn’t favor. Or maybe you’re starting a new venture, from the ground up with the sky as the limit, and you need network architecture that takes you to the moon. ICS can help with that. (more…)
August 18, 2015
Someone asked a reputed “Captain of Industry” when it was appropriate to fire somebody. His response was simple. “The first time is crosses your mind,” he said. If you supervise people, lead a team, herd vendors, or manage customer relationships, you’ve probably asked yourself the same question, and maybe you came up with a better answer. It is more likely that you made an effort to avoid conflict and hoped for the best. Human nature. (more…)
August 14, 2015
The Golden Age of Yesterday
Remember way back, when flip phones roamed the earth and the threat of trojans could be quarantined in the CPUs and laptops in your life? The innocence dissipated with the dawn of smartphones in 2007. Then the deluge of apps ushered in all manner of new threats, but at least you could, in theory, control your exposure by limiting the apps you used and practicing robust password security. Good times, gone the way of the brick and the bag phone. (more…)
July 31, 2015
You’re probably recalling where you were the first time you heard Sting and The Police, or what the funky red graphics were on the cover of that album. That’s what most folks recall. We are, after all, Spirits in the Material World. The expression was actually coined by Gilbert Ryle in his 1949 book The Concept of Mind, an examination of Rene Descartes’ dualistic separation of mind and body. At the core of this philosophical marvel is the notion that the mind and body work independently of one another, and their connection is speculative at best. This concept takes on new relevance in the digital world.
July 27, 2015
June is usually a big month for baseball, but sometimes the biggest news is found beyond the box scores. This year the boys of summer, or at least their front office representatives, took a swing at a slider and hit a really foul ball, making the statistics-obsessed management of America’s game seem like child’s play.
Allegedly, the St. Louis Cardinals hacked the Houston Astros, breaching interior databases that housed trade speculations, scouting reports, and other sensitive, proprietary information about the team. The breach is still under investigation, so the reasons behind the attack remain as elusive as a knuckle ball. It seems likely, though, that the Cardinals were mining Astro data in hopes of building a better team. Or maybe a senseless jab by disgruntled former colleagues.
July 28, 2015
Joey, Have You Ever Been in a Turkish Prison?
The 1980s comedy franchise Airplane does a great job of spoofing the more dramatic Airport and, to a lesser extent, The Poseidon Adventure. At a time when truly global travel was emerging for the general public, there remained in the hearts of many a fear of the complexity of travel, a fear that has almost completely evaporated in the travel world we take for granted these days. Airplane turned chaos into comedy, exploiting the potential for danger and the human love of a train wreck. (more…)
July 24, 2015
The thumb drive sits on the edge of the table, carefully wrapped in cellophane and surrounded by the other promotional materials from the SWAG bag left by the Chamber of Commerce. It was a very nice gesture, and you’re giving serious thought to the guided tour of local brewpubs pictured in one of the brochures, but you eye the thumb drive with suspicion. And rightfully so. (more…)
July 20, 2015
SOC it to You!
Imagine a small chip with an oddly configured pin out footprint, originally designed to connect serial to USB. Now tweak the ROM on that chip, infuse it with a dash of RAM and a sprinkle of flash memory, and you have just actuated SOC, or system on a chip. Actually, you don’t have to imagine it. You can buy the chips for about $5 and use them to connect devices to the old interwebs. That’s right. A $5 chip is now a gateway to the holy grail of network security. (more…)
July 6, 2015
Think of today as Monday. Maybe you’re just back from a long holiday weekend. You’ve celebrated the birth of a nation, perhaps, and the chili dogs are still waging war, keeping the spirit of rest and relaxation alive and well. Now the battle takes a twist as you rattle down the list. These are the projects you face today, the fires that demand your immediate attention, like the chili dogs.
June 24, 2015
Looking for a good business model with a market poised to explode in the next five years? No, it’s not the latest social media platform or even a cryptocurrency. It’s cybercrime, and your business is rapidly becoming their business. (more…)
June 14, 2015
April 15th lurks in the shadows of every year, as inescapable as the Grim Reaper and only slightly less popular. The IRS has conflict in its DNA, as our nation’s first revenue commission was established in 1862 to pay for the Civil War. Repealed ten years later and even ruled unconstitutional by the Supreme Court in 1895, the IRS began collecting income taxes in 1913, after the 16th Amendment was ratified, and the steady gathering of data began.
June 4, 2015
Ever feel like somebody else is in control of your life, flying the airplane that is your body through the friendly skies of your daily routine? Well, if you’re on the same plane with Chris Roberts, you might just be living beyond the metaphor. Chris likes to fly big airplanes, with real people on them. But Chris Roberts is not a pilot.
May 28, 2015
Joplin, Missouri is like a barbell. Downtown retains an interesting mix of history and mid-rise offices while, several miles to the south, the medical complex and commercial corridor almost glistens with new construction. In the middle, a once-vibrant residential area known as South Joplin, is a mix of random new commercial buildings and tract homes, with its former glory wiped away, along with any hint of vegetation, by a Category Five tornado in 2011. All the infrastructure is new, but any visitor would know immediately that the previous iteration of this neighborhood had been stricken from the record. (more…)
May 21, 2015
First Quarter results are in the books, and the contracts you hunted late into last year have borne fruit. Like the Robber Barons of yesteryear, you have a dogged commitment to your industry, though sometimes you wish you had cornered the oil market instead. Because, like the scions of the Gilded Age in American history, you are trying to build trust in a marketplace that often seems more like the wild, wild west. Nevertheless, the horizon seems rife with opportunity and your sales team is all fishing and no cutting bait. (more…)
May 12, 2015
Even in the face of increasing network breaches, we distance ourselves from the threat. It’s a big box retailer or a global bank that’s been violated, not us. Our data and personal information might be in danger, but we assuage our fears with the sense and song that the sun’ll come out tomorrow and we’ll face the new day with purpose, repair the damage, and get on with our lives. What happens, though, when the cyber breach threatens a human heartbeat? (more…)
May 4, 2015
In the fifth of six predictions for IT staffing in 2015, CIO suggests that a robust economy and job market will encourage more full-time employees to seek part-time or freelance work. This trend, they suggest, will repeat similar movement in the previous cycle and reap benefits for both employers, who have the ability to identify and deploy specific needs and talents, and employees, who maximize the return on their particular skill sets. For the sake of argument (and this blog post) let’s assume the predictions are spot on. How does your organization take advantage of the shifting talent pool? (more…)
April 21, 2015
The blue skies above a small bay in early April offer no inkling of the potential chaos lurking in the wings. Just inland from the Gulf of Mexico, tourists comb the backwaters for fish and fun as the manatees swim languidly beneath them, timeless watchmen of the water and the weather. Smoke rises from stacks in the distance, a reminder that even the best nature offers stands in the path of progress. Like the manatees, we must adapt to changes in our world, and our world is probably changing more rapidly than we imagine. (more…)
April 10, 2015
April 13, 2015
Spring is working really hard to push through the snow as chilly nights give way to warmer days and the road beckons the warriors back from a long winter’s nap. It’s time to hit the bricks, pound the pavement, spend the shoe leather, all looking for new opportunities for your business. And, when the day is done, when your team has left nothing on the field in Topeka, given their all in Albany, there’s a cozy bed with rewards points, warm cookies, and complimentary WiFi waiting at the next exit. Home, sweet home, right? (more…)
March 23, 2015
It’s Spring Break, and hundreds of thousands of students from the far reaches of North America are making their way across the USA in a Chevrolet, migrating to the seasonal climes and exotic beverage offerings of sunny Florida. Escaping the more — perhaps presumably — disciplined daily rigors of their college studies, many students engage in atypical behavior, casting inhibitions to the wind and embracing the larger world in various stages of sobriety and dress. It’s all silly college kids until you get the call.
Now imagine your data on Spring Break.
Cocktails and Sunscreen
Your data is your data. You protect it when you can and hope your staff makes good decisions when they take it out into the world, because you know that lurking in the shadows are bad people with even worse intentions. They wait at the bar to offer high-tech cocktails, ones that your data won’t even know it drank. They use proven social engineering techniques to gather information and gain entry, tossing out lines line “Oh yeah, I knew Bif when he was in high school. We go way back.” Next thing you know, your data is enjoying an afternoon on the beach with no sunscreen. Feel the burn.
ICS is the Lifeguard for your data, the designated driver and trusted friend that keeps your data at the party but out of harm’s way. And with ICS you always get two for the price of one, both industry leading expertise and peace of mind.
Call ICS today before you get that distress call from your data. Don’t worry, be happy!
March 6, 2015
You know an issue is prominent when it enters popular culture, and the creators of the wildly successful CSI franchise are hoping to demonstrate the increasing need for cybersecurity vigilance with the newest addition to their portfolio, CSI: Cyber. The bread and butter of this successful series of shows is the slow, complex narrative surrounding a single crime scene. They explore every lead and methodically bring the perps to justice. It’s a great formula for television.
House of Cards
For those Netflix binge watchers out there, consider also the role of the cyberterrorist with the guinea pig. At the beck and call of the FBI because of his nefarious activities, he latches on to the tail of the Frank Underwood storm and hacks his way into the personal information of his captors and their wives. High school kids who’ve been warned a million times about the dangers of their digital footprint marvel at the harvest of his efforts and ask, “How did he get all that information?” (more…)
March 12, 2015
Singing in the Rain
Ever tried to hail a cab at night, in the rain, in Manhattan? Even worse, in a metro market where taxi service is not as fluid? Even if you haven’t, you can probably imagine how innovative an app-based cab service could be. Uber and others are filling this niche in markets across the country and around the globe. The service is almost a seamless hybrid of social media and carpooling, and it’s a great example of how technology is changing the way we interact with each other and the world. (more…)
February 23, 2015
Money for Nothing
In late 2013, ATMs in Kiev began spitting out cash at random times, even if nobody was standing in front of them. Turns out, cash on the concrete was just the tip of the iceberg. By the time investigators got their forensics around the issue, over 100 financial institutions across over 30 nations had been breached in what might be the largest bank theft of all time. (more…)
February 27, 2015
February 18, 2015
February 11, 2015
In response to the ever-increasing number of breaches, including most recently Sony Pictures, The White House has formed the Cyber Threat Intelligence Integration Center to coordinate cyber threat data and assessments. This move is met with both praise and criticism. The frequency and increasing sophistication of the breaches across the private and public sectors leads many to suggest that the government is uniquely positioned to fill this role. Others cite redundancy and inefficiency as characteristic of government intervention and offer little hope that increased government involvement will mitigate the threat.
January 22, 2015
Analysts from the far reaches of the cybersecurity empire remind us of the many challenges we face daily, and some of these will no doubt wreak havoc in 2015 because the threat evolves rapidly to exploit weaknesses we don’t even know exist yet. Other, more predictable threats use proven strategies to exploit known weak links in our organizations. Human links. These are a couple of their stories. (more…)
January 26, 2015
Trouble in the Sandbox
Network security teams use virtual environments, or sandboxes, with their own guest operating systems to allow code to be scrutinized before entry into sensitive areas. If the code is malicious, the sandbox throws it out before it does harm. But sandboxes attract two things, clever kids and cats. Cats move the sand around when nobody’s looking and leave a little something extra, so you know they’ve been there. Clever, industrious kids sit on the edge and patiently move the sand around to suit them. Clever adults do the same thing. (more…)
January 15, 2015
When crossing the streets of Great Britain, it’s hard not to notice the strong encouragement painted on the curb at your feet to “Look Right,” or “Look Left,” depending on the flow of traffic. These directions have an explicit purpose. It’s amazing how many people, especially tourists, are struck by passing cars because they didn’t look in the correct direction. Remember, Britons drive on what Americans consider the “wrong” side of the road, and we are conditioned to look left initially when crossing the street. Fatal mistake for many. (more…)
January 13, 2015
James Franco: National Security Threat
Somewhere near the confluence of American entertainment and North Korean sensitivity, a cyber attack has sparked a national debate and an international incident, with fingers pointed and appropriate responses promised. The Interview has since been released online and in selected theaters, and the unexpected PR generated by the hacking has probably done a great deal to advance the profitability of the film. It even garnered a Presidential nod at a White House press conference. (more…)
December 17, 2014
In fact, you already do. You just don’t get credit for it. Every time you enter the ether, you leave a trace. But you already know that. It’s the reason you face the right ads the next time you cross the threshold. It’s why social media companies work so hard to keep you active on their sites, free of charge. You already know that in those settings where you don’t pay for a product or service, it’s because you are the product. But it’s about to get real (and probably has already). (more…)
December 23, 2014
It’s the night before Christmas. You’ve hung the stockings with care and set out the cookies and carrots. Your organization’s year-end results suggest that you’ve been good, but you better not cry, better not pout, and here’s why: you’re hoping for even more growth in 2015 and Santa’s coming to town. (more…)
December 12, 2014
Cybersecurity is approaching oxygen and water on the list of things we need to survive in this crazy world of ours. The threats are very real, whether deployed by governments around the globe or neckbeard hackers in the window booth at the corner coffee shop. The technology we create to make our lives easier now requires extraordinary vigilance, but it’s not the machines we should fear, as science fiction writers originally thought. The biggest threats seem to be the humans manipulating the good technology for bad purposes, and we can never completely isolate ourselves from them. Or can we? (more…)
December 4, 2014
Have you ever seen a movie you disliked so much that you wanted your money back? Maybe you kept hoping it would get better but finally you just had to get up and leave. We even use the previews to judge the movies by their covers, voting with our wallets to guide movie studios across our discriminating palates.
Now imagine disliking a preview so much that North Korea orders its national army’s cyberwar unit to hack into the Sony Pictures network and create as much chaos as possible without leaving a trail. That’s a strong vote with a big wallet and even bigger repercussions. (more…)
December 1, 2014
Cyber Monday. The masterful creation of marketing professionals, designed to tap your wallet before the turkey and dressing settle in your tummy. Think of the sheer volume of sensitive consumer information that will be wafting through the ether on this day, searching out bargains and tantalizing hackers. Imagine millions of people walking through a big mall with their purses and wallets wide open and you begin to get the picture. But who doesn’t love a deal? And in today’s digital, global, Internet-of-Things, consumption-driven economy, who are we to argue with the ease with which we transact? (more…)
December 9, 2014
Jeremy Hammond. A name you’ve probably never heard of. And he was recently the FBI’s most-wanted cybercriminal. As a hactivist for more than a decade, Hammond breached Stratfor, a security company with clients like Homeland Security and the Defense Department. At one point he knew the credit card information for the United States Marine Corps. Hackers with that kind of chutzpah are few and proud, indeed. (more…)
November 27, 2014
Your organization has weathered some storms, am I right? The valleys between the peaks, when sales slow and payroll weighs heavy on the mind. You’ve hired through the good times and had to cut back in the lean times, but you and Michael have rowed your boat ashore, leaving the roiling seas of fiscal uncertainty behind you. Welcome to Plymouth Rock, Pilgrim. How about some steady quarterly earnings and revenue growth to go with that maize? (more…)
November 19, 2014
Utility companies are tearing up 9th Avenue in Midtown Manhattan, fueling the frustration of cabbies and pedestrians alike. The pasta bowl that is the highway system surrounding Atlanta is almost always under construction, locking traffic up around the clock, it seems. Both examples show the impact of interrupting the flow of traffic. As we build and grow our human presence, infrastructure never seems adequate, but we are always hesitant to change or upgrade because we don’t want to interrupt the flow. We close our eyes and cross our fingers. (more…)
November 6, 2014
The media is not short on cybersecurity horror stories, from Home Depot getting hammered to big bank back room holdups, all by nefarious hackers working from their parents’ basements. Or so it would seem. Truth is, 80% of all corporate breaches find their root cause in employee negligence, not hackers working alone. (more…)
October 23, 2014
Tis the season and all the more reason to correlate Halloween with Cybersecurity. You’ve got the bucket of candy by the door and the neighborhood streets are awash with flashlights and Jack O’Lanterns, so settle in for a harrowing tale of mischief and mayhem. You’ll have to imagine Vincent Price’s voice. Sorry. (more…)
October 16, 2014
Chicks Dig the Front Man
Your sales team has sold the project, and it’s a big one. Kudos to the people people, the extroverts with the skill to reel in the whales as the technical terms from the carefully wrought spec sheet fall trippingly off their tongues. Somewhere somebody’s writing a beer commercial about their sales prowess, but for now you’ve got to get the band back together because you’ve got a show to do. And the lull between projects hasn’t been kind. (more…)
October 9, 2014
The Eyes Have it
Have you ever been banking at an ATM and felt like the people in line behind you were standing a little too close? Or the card swipe at the grocery store? How about the catalog salesperson who asks for your card info AND the secret number. Does a little wisp of doubt ever cross your mind that the whole thing is some elaborate scam? (more…)
September 24, 2014
Deep in the SWAG bag from last month’s conference, next to the pens and sticky pads but well below the cleverly-branded drink can insulators, lurks a quiet but deadly threat to your organization that even the little bottle of hand sanitizer is powerless against. And there are three more just like it hiding at the back of your top desk drawer. And one more in each of your kids’ backpacks. The kids, really? You put the kids at risk? (more…)
September 17, 2014
Remember the novelty of the knock knock joke, the thousands of iterations and puns that could be generated from the simplest of phrases? Orange you glad I asked? It’s all coming back to you, isn’t it? The response always starts with a chuckle, a reward for the cleverness of the wordplay. Near the end of the joke series (because there is never just one) a groan ensues, patience ends, and clever children are banished to the kids’ table or told to go play outside. (more…)