Posts for category: Best Practices Weekly Summaries

Russia’s Cyber Strategies

(By: William Beard on November 4, 2021) Executive Summary There has been an uptick in fourth and fifth-generation warfare in the last few decades and a major player in that has been ...

The Next Generation and Cyber Security

(By: William Beard on October 21, 2021) Executive Summary According to research recently published by the National Cybersecurity Alliance (NCSA), lack of cybersecurity training and education ...

Syniverse Short Message Service (SMS) Hack and Two Factor Authentication

(By: William Beard on October 5, 2021) Executive Summary Syniverse a Short Message Service (SMS) routing company based out of Hong Kong disclosed on September 27th, 2021, that it had been hacked ...

Agricultural Supply Chain Attack

(By: William Beard on September 30, 2021) Executive Summary The agricultural sector has been hit with yet another cyberattack in 2021. New Cooperative a Iowa based grain collective was hit ...

Apple Zero Click iMessage Exploit

(By: William Beard on September 17, 2021) Executive Summary Citizen Labs, a research group at the University of Toronto recently discovered a vulnerability in all of Apple’s operating ...

Responding to a Cyber Security Incident

What is a Cyber Security Incident? A Cyber Security Incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security ...

Romance Scams: True Deception

On February 12, 2019, The Federal Trade Commission (FTC) release an article warning of the dangers of the Romance Scams.  In a Romance Scam, cyber criminals gain the confidence/trust of their ...

Domain Name System(DNS)

DNS allows a user to type a Uniform Resource Locator (URL) into the browser which sends the user the requested website. In the background, DNS servers are communicating with each other to resolve ...

Email: Don’t Pass Go!

Businesses are highly affected by email scams. One scam reaching critical level is the W-2 scam.  The scam is aimed toward the HR department of an organization using sophisticated phishing ...

Access Control Models

Background – Considered one of the most crucial assets in a company, access control systems hold significant value. The term ‘access control’ refers to “the control of access to system ...