Posts for category: Best Practices Weekly Summaries

Weekly Executive Summary for Week of September 2, 2016

2012 Dropbox Hack Exposes 68 Million Dropbox Accounts In 2012, Dropbox disclosed they had been breached, but did not reveal the extent of the breach.  It resulted in usernames and hashed ...

Weekly Executive Summary for Week of August 12, 2016

Security Practices to Protect Against Android QuadRooter Vulnerability Check Point revealed at DEF CON 24 in Las Vegas that Android smartphones and tablets have four new vulnerabilities to contend ...

Weekly Executive Summary for Week of August 5, 2016

Cybersecurity Best Practices for the 2016 Rio Olympics August 5, 2016 marks the start of the Olympic Games in Rio de Janeiro.  Large, high-profile events may attract cyber criminals attempting to ...

Best Practices Weekly Summary for Week of July 29, 2016

Cyber Security Best Practices to Prevent Data Exfiltration in Wake of DNC Email Hack Recently 19,252 internal emails from the Democratic National Committee were released to the public.  This is ...

Best Practices Weekly Summary for Week of July 22, 2016

Always Read the Terms of Service and Privacy Policies Every application installed or online service used offers a Terms of Service (TOS) and a Privacy Policy (PP) for its users to read and agree ...

Best Practices Weekly Summary for Week of July 15, 2016

Cyber Security Practices for Pokémon GO Niantic’s augmented reality game Pokémon GO has become one of the most popular downloads in the Apple App and Google Play stores.  Since its launch on ...

Best Practices Weekly Summary for Week of July 8, 2016

Facebook Messenger Offers End-to-End Encryption This week, Facebook began testing a program offering end-to-end encryption for conversations done with its Messenger program.  The program, called ...

Best Practices Weekly Summary for Week of July 1, 2016

IRS Protection for Taxpayer Information The Internal Revenue Service (IRS) has announced that the electronic filing PIN tool will no longer be available.  These e-File PINs were being accessed by ...

Best Practices Weekly Summary for Week of June 24, 2016

Google Simplifying Two-Step Verification Two-step verification is an important feature used by many companies.  With the use of a phone or a secondary email, a user can provide additional ...

Best Practices Weekly Summary for Week of June 17, 2016

Business Email Compromise Scams On Tuesday the FBI released a public service announcement warning that there has been a major spike in business email compromise (BEC) scams.  BEC scams are ...