When The Chips Are Down
Ever had that feeling that someone is watching you, like the door is ajar and folks just passing by the office can see everything on your desk? Have you felt that way for the last seven years? If so, you’re not alone, especially if your computers use Intel chips with vPro technology. According to a recent […]
Is That Toaster Listening To Us?
In the interest of your organization’s OPSEC, step away from the microwave before you answer this question. There is no telling who might be listening right now. And if you’ve ever had Russian dressing on your salad, be sure you state that explicitly. Denial is not just a river in Egypt. Here’s the question: How […]
Who’s Baking Your Cookies?
So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the […]
Who’s Watching The Watchers?
It’s been a strange month or two in the world, and that’s not simply a political statement. There is a very real sense that somebody’s watching, all of us, all the time, and that we should take that for granted. Increasingly, it seems, that voyeurism extends beyond our digital footprint and into our everyday physical […]
Now You See It, Now You Don’t
Stand against the wall. That’s the common advice given to tourists when they start to make calls on their smartphones in foreign lands. It’s not the roaming charges you have to look out for any longer. It’s now the roaming thieves who want to steal your phone in broad daylight and compound the pain by […]
Bundle Up To Avoid The Cold
With every passing week, it seems, cyberthreats and hacks inundate the news cycle and bring home the absolute insecurity that most of us experience (or should) when we take even the smallest of baby steps with our digital footprints. Of late, it’s the Russians who seem to take center stage, hacking our politics and manipulating […]
Hook, Line, And Sinker
Spring may well be upon us, and soon the sportsmen will be casting lines into the lakes and rivers and seas in search of the great bounty that awaits them there. To that end they will deploy any manner of temptation, or bait, that will facilitate the biggest possible catch. But it’s not as seasonal […]
Cybersneaky Russians
Remember, back in college, when you got away with things the older, more responsible, adult version of you would never even try? Now think back to some of your friends that were also involved. You know the ones. But if you decided one day that you were going to seek public office and expose yourself, […]
A Cyberhand On Your Wallet
You’re an entrepreneur building a good business, perhaps, or a senior executive leading an organization with both impact and momentum. Either way, you’re building value through your network and data and making a good faith effort to protect those valuable assets. You’ve got an IT staff, maybe, or a CTO that knows your infrastructure like […]
A Treasure Map To The Goods
How would the security of your house be affected if you printed a map of your hiding places for all of your valuables and taped it permanently to the front door? Probably wouldn’t work in your favor in the long term, even if you argue that the burglars would still need to be targeting your […]