Blog
Lessons from the Jayden K Smith Warning on Facebook
Last week, no one on Facebook was hacked by Jayden K Smith and that bothers me. I’ve spent the better part of my adult life trying to get people to pay attention to computer security. Seeing a warning of a security risk -- social engineering in this case -- go viral...
#Nyetya (#NotPetya) – Some Additional Notes – June 29, 2017
There is lots of misinformation flying around about the #NotPetya malware but there are several important issues that are becoming clear that are important for protecting your organization. There is no credible evidence that #Nyetya has ever spread through email. In...
Petya–No Ransoms–Bigger Problems
At first Petya (or Petwrap, NotPetra) seemed like a very similar attack to WannaCry, which was unleashed in May, causing havoc and mayhem to many parties, especially for the UK's NSH and Spain's Telefonica. With WannaCry, computers and networks were frozen, but...
Click This Not That: WannaCry
In response to today’s massive cyberattack on the UK’s National Health System and at least 74 other countries, it is important to acknowledge two things: all institutions are vulnerable and people are the weakest link. According to the New York Times, NHS staff...
Cybersecurity Strategic Partners for Small and Mid-Sized Organizations
Aeris Logic LLC welcomes Marc Helfman as our first guest blogger. Thank you for you contribution, Marc! We appreciate it. Being responsible for a cybersecurity program at a small-to-mid sized business certainly has it’s advantages compared to that of a larger company,...
Have You Ever Tried to Buy Bitcoins at Midnight?
Recent estimates put the cost of ransomware at $1 billion dollars a year—and the hackers are getting smarter and more sophisticated. Although ransomware has been around since 2005, the scale and complexity of the crimes are more and more dangerous. Combine that with...
Multi-Cloud Solutions
Many businesses believe that moving to the cloud means selecting one provider based on features and costs, then deciding when and how to migrate services to it. Depending upon your design, this approach can mitigate many risks. But as recent cloud outages have shown...