Posts for category: Best Practices Weekly Summaries

Weekly Executive Summary for Week of September 30, 2016

Best Practices for Email Security Email is the still the one of the heaviest used form of communication today, especially in businesses.  Even with the popularity of file sharing, email still ...

Weekly Executive Summary for Week of September 23, 2016

Cyber Security Best Practices after Massive Yahoo Data Breach 500 million Yahoo user accounts were stolen by state-sponsored hackers in an attack that occurred on their network in late 2014. ...

Weekly Executive Summary for Week of September 16, 2016

FBI Encourages Reporting of Ransomware Infections The Federal Bureau of Investigations (FBI), jointly with the Internet Crime Complaint Center (IC3), sent out a public service announcement ...

Weekly Executive Summary for Week of September 2, 2016

2012 Dropbox Hack Exposes 68 Million Dropbox Accounts In 2012, Dropbox disclosed they had been breached, but did not reveal the extent of the breach.  It resulted in usernames and hashed ...

Weekly Executive Summary for Week of August 12, 2016

Security Practices to Protect Against Android QuadRooter Vulnerability Check Point revealed at DEF CON 24 in Las Vegas that Android smartphones and tablets have four new vulnerabilities to contend ...

Weekly Executive Summary for Week of August 5, 2016

Cybersecurity Best Practices for the 2016 Rio Olympics August 5, 2016 marks the start of the Olympic Games in Rio de Janeiro.  Large, high-profile events may attract cyber criminals attempting to ...

Best Practices Weekly Summary for Week of July 29, 2016

Cyber Security Best Practices to Prevent Data Exfiltration in Wake of DNC Email Hack Recently 19,252 internal emails from the Democratic National Committee were released to the public.  This is ...

Best Practices Weekly Summary for Week of July 22, 2016

Always Read the Terms of Service and Privacy Policies Every application installed or online service used offers a Terms of Service (TOS) and a Privacy Policy (PP) for its users to read and agree ...

Best Practices Weekly Summary for Week of July 15, 2016

Cyber Security Practices for Pokémon GO Niantic’s augmented reality game Pokémon GO has become one of the most popular downloads in the Apple App and Google Play stores.  Since its launch on ...

Best Practices Weekly Summary for Week of July 8, 2016

Facebook Messenger Offers End-to-End Encryption This week, Facebook began testing a program offering end-to-end encryption for conversations done with its Messenger program.  The program, called ...