Friday 31 March 2017

UK leading in using red team cyber security testing

Red teaming is set to become a key approach to ensuring cyber security controls and processes are fit for purpose and compliant with regulations, and the UK is leading the way

from ComputerWeekly: IT security http://www.computerweekly.com/news/450416013/UK-leading-in-using-red-team-cyber-security-testing


from Tumblr http://zoehamilton671.tumblr.com/post/159042606175
via Zoe Hamilton

Enterprise wireless: trends and developments in 2017

What will be the main developments in wireless this year and what challenges will this bring to enterprises?

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Enterprise-wireless-trends-and-developments-in-2017


from Tumblr http://zoehamilton671.tumblr.com/post/159042606040
via Zoe Hamilton

Rudd backs down on end-to-end encryption

Lib Dems welcome government’s apparent U-turn on seeking to restrict end-to-end encryption for popular messaging apps and online communication services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415991/Rudd-backs-down-on-end-to-end-encryption


from Tumblr http://zoehamilton671.tumblr.com/post/159034027725
via Zoe Hamilton

Thursday 30 March 2017

Marco Rubio Says Hack Attempts From Russia Targeted Him, Too

Marco Rubio Says Hack Attempts From Russia Targeted Him, Too
Attempted intrusions against any senator aren’t surprising. But they’re a reminder election hacking shouldn’t be a partisan issue. The post Marco Rubio Says Hack Attempts From Russia Targeted Him, Too appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/marco-rubio-says-hack-attempts-russia-targeted/
from Tumblr http://zoehamilton671.tumblr.com/post/159013164645
via Zoe Hamilton

Security Think Tank: Business input will help keep security usable and cost effective

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Business-input-will-help-keep-security-usable-and-cost-effective


from Tumblr http://zoehamilton671.tumblr.com/post/159009105015
via Zoe Hamilton

What is the best defence against ransomware?

protect yourself against ransomware

Ransomware has quickly become one of the most damaging and powerful malicious software that is responsible for downtime in systems of a business. Ransomware is so dangerous that if you become a victim of it, there is no way out of it until you have paid the ransom.

The only way to save your system from ransomware is to backup your data. Here are a couple of ways how you can secure your system from getting infected with ransomware in the first place:

You have to make sure that you have backup administrator accounts made on every system in your business or home. This is because hackers are aware that people are backing up their data and they are now mostly targeting backups first before going for the actual data. This can only be done if they get access to administrative rights on the system.

You need to have some sort of cloud service to help upload and manage different versions of your backup data. You should ideally back up your important data one file at a time because it takes time to get data file by file. If a folder is uploaded, anyone can simply get access and quickly download all the files.

To fully prevent your system from getting ransomware infection, you must be able to put up preventative methods in place. This includes as mentioned above, regular backups of your data on different systems and administrative accounts. Also, back up your data off the system on an external drive to double up your preventative measures.

With these security measures in place, even if ransomware somehow locks your data, you’ll always have a backup to restore.

Moreover, most ransomware makes their way into your system through the internet. If you regularly browse random websites on the internet, make sure you never click on things that you are not familiar with.

The post What is the best defence against ransomware? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/best-defence-ransomware/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/159001706340
via Zoe Hamilton

First cyber security startups graduate from GCHQ accelerator

The first group of companies has completed a government-led cyber accelerator programme aimed at helping UK startups take the lead in producing the next generation of cyber security systems, with another round to be announced in 2017

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415880/First-cyber-security-startups-graduate-from-GCHQ-accelerator


from Tumblr http://zoehamilton671.tumblr.com/post/158999804370
via Zoe Hamilton

More than a quarter of SME staff lack cyber threat training

Data from cyber insurance provider CFC Underwriting shows that 38% of its claims in 2016 could have been avoided through better staff education and training on cyber risks

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415869/More-than-a-quarter-of-SME-staff-lack-cyber-threat-training


from Tumblr http://zoehamilton671.tumblr.com/post/158999804255
via Zoe Hamilton

Nearly a third of malware attacks are zero-day exploits

Companies could be missing up to third of malware that is targeting them, according to a report by WatchGuard

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415866/Nearly-a-third-of-malware-attacks-are-zero-day-exploits


from Tumblr http://zoehamilton671.tumblr.com/post/158999803900
via Zoe Hamilton

Wednesday 29 March 2017

How an Anarchist Bitcoin Coder Found Himself Fighting ISIS in Syria

How an Anarchist Bitcoin Coder Found Himself Fighting ISIS in Syria
The strange story of Amir Taaki—Bitcoin coder, anti-ISIS revolutionary, and British terrorism defendant. The post How an Anarchist Bitcoin Coder Found Himself Fighting ISIS in Syria appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/anarchist-bitcoin-coder-found-fighting-isis-syria/
from Tumblr http://zoehamilton671.tumblr.com/post/158980643070
via Zoe Hamilton

Thorn CEO on using machine learning and tech partnerships to tackle online child sex abuse

The CEO of US-based no-profit Thorn explains how cross-industry collaboration and machine learning is helping her organisation stay one step ahead of online child sex abusers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415609/Thorn-CEO-on-using-machine-learning-and-tech-partnerships-to-tackle-online-child-sex-abuse


from Tumblr http://zoehamilton671.tumblr.com/post/158977915915
via Zoe Hamilton

Girls across UK take part in cyber skills event to promote tech careers

Young women from across the UK took part in cyber security event CyberFirst Girls, designed to promote girls with cyber skills and encourage them to pursue careers in technology

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415788/Girls-across-UK-take-part-in-cyber-skills-event-to-promote-tech-careers


from Tumblr http://zoehamilton671.tumblr.com/post/158967105520
via Zoe Hamilton

Security Think Tank: Four guidelines on how balance security, usability and cost

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Four-guidelines-on-how-balance-security-usability-and-cost


from Tumblr http://zoehamilton671.tumblr.com/post/158967105225
via Zoe Hamilton

Non-malware attacks pose bigger threat than malicious software

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415775/Non-malware-attacks-pose-bigger-threat-than-malicious-software


from Tumblr http://zoehamilton671.tumblr.com/post/158967104690
via Zoe Hamilton

Belfast Waterfront centre equipped with state of the art network

Belfast City Council has refitted its Waterfront conference and entertainment venue with new smart building connectivity to enhance the staff and visitor experience

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415770/Belfast-Waterfront-centre-equipped-with-state-of-the-art-network


from Tumblr http://zoehamilton671.tumblr.com/post/158967104925
via Zoe Hamilton

Cyber attacks cost financial firms up to £1.6m a time

The costs associated with cyber attacks on the financial sector are rising as organisations face increasingly sophisticated threats, research shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415771/Cyber-attacks-cost-financial-firms-up-to-16m-a-time


from Tumblr http://zoehamilton671.tumblr.com/post/158967104395
via Zoe Hamilton

In-flight electronics ban unsustainable, says IATA

The IATA calls on the American and British governments to urgently find alternatives to restricting the carry-on of laptops and tablets on Middle Eastern flights

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415763/In-flight-electronics-ban-unsustainable-says-IATA


from Tumblr http://zoehamilton671.tumblr.com/post/158961704875
via Zoe Hamilton

US internet users' browsing history may soon be up for sale

US president Donald Trump is expected to approve a resolution repealing planned privacy protections that will enable ISPs to sell customer browsing data

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415761/US-internet-users-browsing-history-may-soon-be-up-for-sale


from Tumblr http://zoehamilton671.tumblr.com/post/158960726280
via Zoe Hamilton

Tuesday 28 March 2017

Threats grow in Saudi Arabia’s cyber sector

Saudi Arabia’s wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime?

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415661/Threats-grow-in-Saudi-Arabias-cyber-sector


from Tumblr http://zoehamilton671.tumblr.com/post/158953748040
via Zoe Hamilton

How do you gain cybersecurity experience when you have just finished a cybersecurity program?

how to gain experience in cyber security when you finish your first security program

Have you just finished a cyber security program and wondering what to do next? Well if you are someone who is completely new to the field, you’re going to have to work a little harder than just getting a cyber security certification.

The thing is cybersecurity professionals are in high demand but companies are reluctant on hiring inexperienced professionals. So if you really want to step into the world of internet and network security, the first thing is to get experience in the field. But how do you do that? We’re here to help.

  • First things first, you need to start off by studying more and more. A mere security certification is just not enough to land a high paying job in the cyber security field. There’s tons of competition and trends keep changing.
  • Find reliable websites where free resources are provided in forms of online books, blogs and other press releases that can help you understand the technology and security dynamics.
  • Once you are done with that, find online forums on the internet that are filled with cyber security professionals. These guys are always willing to share their knowledge and ideas with newcomers.

If you aren’t already working for in a beginner cyber security position, try to find ways to implement your knowledge within your current organization. After all, nearly all small businesses, companies and organizations have some sort of network available that needs protection. Start experimenting there if your peers haven’t already used the help of cyber security professionals.

Try to find various ways to protect the current network and computer systems installed in your company. Even if your company is already using someone for security, you can always sit with them and look for advice. Why not spend some extra hours at work sitting with the IT security guy and learning what he does to protect the network?

If that isn’t enough, you can always start a home lab using virtual machines and install tools on them to experiment.

The post How do you gain cybersecurity experience when you have just finished a cybersecurity program? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/gain-cybersecurity-experience-just-finished-cybersecurity-program/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158930576965
via Zoe Hamilton

Security Think Tank: Use flexible tech backed by security policy for competitive edge

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415671/Security-Think-Tank-Use-flexible-tech-backed-by-security-policy-for-competitive-edge


from Tumblr http://zoehamilton671.tumblr.com/post/158930293795
via Zoe Hamilton

Monday 27 March 2017

Security Think Tank: Enable people using good security and risk methodology

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Enable-people-using-good-security-and-risk-methodology


from Tumblr http://zoehamilton671.tumblr.com/post/158903900290
via Zoe Hamilton

Nearly half of UK businesses lack a cyber security strategy

Commentators call on security industry to do more to help businesses understand the value of data and how best to protect it

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415607/Nearly-half-of-UK-businesses-lack-a-cyber-security-strategy


from Tumblr http://zoehamilton671.tumblr.com/post/158903899820
via Zoe Hamilton

UK business least likely to offer rewards to infosec professionals

UK firms need to rethink incentives to attract and retain people with cyber security skills, according to the findings of a recent global study

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415576/UK-business-least-likely-to-offer-rewards-to-infosec-professionals


from Tumblr http://zoehamilton671.tumblr.com/post/158892995360
via Zoe Hamilton

Friday 24 March 2017

UK impersonation fraud up 39% in last quarter of 2016

Just ahead of the end of the UK tax year, a survey underlines the importance of guarding against business email compromise aimed at stealing data and money

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415503/UK-impersonation-fraud-up-39-in-last-quarter-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/158782700425
via Zoe Hamilton

Case study: How the Department for Education deployed flexible IT

The Department of Education has upgraded its ageing datacentre to the Azure cloud and Office 365, and rolled out Microsoft Surface devices

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415394/Case-study-How-the-Department-for-Education-deployed-flexible-IT


from Tumblr http://zoehamilton671.tumblr.com/post/158782700275
via Zoe Hamilton

Security Think Tank: Minimise data to cut costs and comply with GDPR

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Minimise-data-to-cut-costs-and-comply-with-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/158778503160
via Zoe Hamilton

FBI director reiterates call for action on encryption

The world is wasting time in resolving the conflict between privacy and public safety, and should consider an international framework on encrypted data access, says FBI director James Comey

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415483/FBI-director-reiterates-call-for-action-on-encryption


from Tumblr http://zoehamilton671.tumblr.com/post/158775981140
via Zoe Hamilton

Thursday 23 March 2017

5 Super easy ways to bump your computer security

super easy ways to bump your computer security at home

Protecting your computer or smartphone should come naturally because of the rising trend of cyber threats across the world. Over the internet, you’ll come across numerous ways to safeguard your digital life, but most of them talk about advanced methods to protect your computer that is only fit for a company or organization. What do you do when you are just an everyday user?

We have collected a list of super easy ways you can protect your computer if you are an everyday user of the internet.

Use private mode to browse the internet

  • Every browser comes with a private mode these days. Regardless of what internet browser you are using, if you are outside your home, never browse the internet without turning on the private mode. Private mode protects you by making sure your information is deleted once you have stopped using the browser.

Never ignore system updates

  • There’s a reason why your Windows keeps telling you to update your copy. OS companies release updates on nearly a daily basis to fight back hackers and other cyber criminals. By keeping your system up to date, you are protecting it by filling loopholes in OS security.

Back up your data every now and then

  • Backing up your data should become a habit for you. Even if you become a victim cyber crime and lose your data to hackers or cyber criminals, you can always restore a backup of your most recent data. There are tons of software out there that let you back up your entire computer to the cloud.

Don’t click on links in an email

  • Our emails usually start getting emails from different entities over the internet. Sometimes you’ll come across emails that have links inside. Never click on that link if the sender is not someone you trust. Hackers spread links on emails in hopes that you would click them and fill out their forms. Sometimes just merely clicking on the link and opening the page gives hackers enough time to inject malicious data into your computer.

Install anti-malware software

Your anti-virus is not enough to defend against threats on the internet. There’s a malicious entity known as malware that can easily bypass any anti-virus. Only a good anti-malware can protect you against these. Remember, hackers these days usually use malware to breach security, so make sure you have one installed on your computer or smartphone.

The post 5 Super easy ways to bump your computer security appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/5-super-easy-ways-bump-computer-security/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158749058425
via Zoe Hamilton

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code
The leak shows how physical access hacks can plant undetectable spying code deep in a Macbook’s firmware. The post WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/wikileaks-shows-cia-can-hack-macs-hidden-code/
from Tumblr http://zoehamilton671.tumblr.com/post/158748206950
via Zoe Hamilton

LastPass releases fix browser extension security flaws

LastPass has been praised for its quick response in fixing flaws reported in browser extensions for its password manager

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415398/LastPass-releases-fixes-browser-extension-security-flaws


from Tumblr http://zoehamilton671.tumblr.com/post/158741920895
via Zoe Hamilton

Apple denies hackers holding millions of iPhones, iCloud accounts ransom

Apple reassures customers that none of its systems have been breached, dismissing hackers’ claims that millions of iPhones and iCloud accounts are at risk of being wiped

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415390/Apple-denies-hackers-holding-millions-of-iPhones-iCloud-accounts-ransom


from Tumblr http://zoehamilton671.tumblr.com/post/158739451170
via Zoe Hamilton

Wednesday 22 March 2017

PSD2 – time to open and secure APIs and rethink business models

With the EU’s Payment Service Directive (PSD2) going into effect in January 2018, banks have no time to waste in preparing for the changes it will bring

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/PSD2-time-to-open-and-secure-APIs-and-rethink-business-models


from Tumblr http://zoehamilton671.tumblr.com/post/158711950420
via Zoe Hamilton

Good News: Android’s Huge Security Problem Is Getting Less Huge

Good News: Android’s Huge Security Problem Is Getting Less Huge
According to Google’s own stats, only half of Android devices received a security update any time in 2016. The post Good News: Android’s Huge Security Problem Is Getting Less Huge appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/good-news-androids-huge-security-problem-getting-less-huge/
from Tumblr http://zoehamilton671.tumblr.com/post/158706859885
via Zoe Hamilton

Security Think Tank: Education and automation will up security and cut user friction

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Education-and-automation-will-up-security-and-cut-user-friction


from Tumblr http://zoehamilton671.tumblr.com/post/158702093250
via Zoe Hamilton

Most UK businesses in the dark about crucial DNS infrastructure

Most UK businesses have little visibility or control over their DNS servers and services even though they are a key component of businesses’ infrastructure and security profile

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415313/Most-UK-businesses-in-the-dark-about-crucial-DNS-infrastructure


from Tumblr http://zoehamilton671.tumblr.com/post/158702093075
via Zoe Hamilton

Tuesday 21 March 2017

CW500 video: Monica Cardoso Salgado discusses the significance of GDPR to CIOs

GDPR comes into force on 25 May 2018. We speak to Monica Cardoso Salgado, senior manager, data privacy & governance at John Lewis Partnership about the implications

from ComputerWeekly: IT security http://www.computerweekly.com/video/CW500-video-Monica-Cardoso-Salgado-discusses-the-significance-of-GDPR-to-CIOs


from Tumblr http://zoehamilton671.tumblr.com/post/158676750910
via Zoe Hamilton

CW500 video: Chiara Rustici discusses the significance of GDPR to CIOs

The EU’s General Data Protection Regulation (GDPR) comes into force on 25 May 2018. Chiara Rustici, an Independent GDPR analyst, discusses the implications

from ComputerWeekly: IT security http://www.computerweekly.com/video/CW500-video-Chiara-Rustici-discusses-the-significance-of-GDPR-to-CIOs


from Tumblr http://zoehamilton671.tumblr.com/post/158676750640
via Zoe Hamilton

UK bans electronic devices from Middle Eastern flights

The UK government has announced that laptops and tablets will be banned from airliner cabins on UK-bound flights from a number of Middle Eastern countries

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415270/UK-bans-electronic-devices-from-Middle-Eastern-flights


from Tumblr http://zoehamilton671.tumblr.com/post/158674187820
via Zoe Hamilton

4 Reasons Why Your Small Business Requires Cyber Security

Why small businesses require cyber security

A recent survey conducted by Cyber Security Alliance revealed that one out of every five small business is a victim of cyber crimes. And those businesses that are victims go out of business within six months after the attack.

Several big name organizations have been a victim of big data breaches in the past. Which means that as a small business, you’re also on the target list of cyber criminals. Here are the top reasons why you should consider adding cyber security to your business starting today.

Your business is an information mine

  • Hackers are always looking for information and no matter what business you are running, you probably have information that is meaningful to them. This information includes customer information which is almost always the prime target of cybercriminals. Safeguard your business to make sure your valuable customer information does not end up in the hands of cyber criminals.

Cyber threats are very real and increasing in number

  • According to a recent survey, cyber-attacks are targeting small and medium-sized businesses because they are easy to breach. Most small businesses do not spend enough on protecting their networks which make them an easy target for hackers to steal information from.

If you are a small business owner and you think hackers only target big organizations, this should be a wake-up call for you.

Hackers are targeting the cloud now

  • If most of your data is on the cloud and you think you are safe, you’re wrong. Hackers are actively targeting the cloud because they know business owners think they’re safe once their data is in the cloud. It is important for you to implement some sort of security for your cloud.

Cybercriminals are increasing in number and small businesses have become their favorite target

Large organizations are well protected and hence un-experienced cyber criminals avoid trying to breach them. But the same cannot be said for small businesses whose security budgets are very limited. That is why they are actively looking for businesses that do not implement enough security measures.

Don’t ignore cyber security just because you’re a small business. You are the number one target for criminals.

The post 4 Reasons Why Your Small Business Requires Cyber Security appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/4-reasons-why-your-small-business-requires-cyber-security/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158669014415
via Zoe Hamilton

Lords call on ISPs, government to do more to safeguard children online

A House of Lords Select Committee report on online safety has called for internet service providers and the government to do more to protect the interests of children using the internet

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415231/Lords-call-on-ISPs-government-to-do-more-to-safeguard-children-online


from Tumblr http://zoehamilton671.tumblr.com/post/158665842260
via Zoe Hamilton

Three fails to stop second data leak

Mobile operator Three should have done a thorough review and upgrade of security after its previous security breach to avoid another incident just months later, say security commentators

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415227/Three-fails-to-stop-second-data-leak


from Tumblr http://zoehamilton671.tumblr.com/post/158665139205
via Zoe Hamilton

Security Think Tank: Practical steps to increasing security without reducing usability

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Practical-steps-to-increasing-security-without-reducing-usability


from Tumblr http://zoehamilton671.tumblr.com/post/158665139070
via Zoe Hamilton

Russian Citadel malware developer cuts deal with US authorities

US Justice Department set to sentence a second Russian hacker for helping to develop Citadel malware that netted $500m, but says investigations are continuing

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415214/Russian-Citadel-malware-developer-cuts-deal-with-US-authorities


from Tumblr http://zoehamilton671.tumblr.com/post/158665138915
via Zoe Hamilton

Monday 20 March 2017

Many UK local councils still unprepared for GDPR, ICO survey shows

The ICO fines the Norfolk Council as it publishes GDPR guidelines for local councils after a survey revealed not all were up to speed in preparations to comply with the new data protection law

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415163/Many-UK-local-councils-still-unprepared-for-GDPR-ICO-survey-shows


from Tumblr http://zoehamilton671.tumblr.com/post/158636270295
via Zoe Hamilton

Security Think Tank: Governance framework key to best security at lowest cost

How can organisations maintain usability and keep support costs low without compromising on security?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Governance-framework-key-to-best-security-at-lowest-cost


from Tumblr http://zoehamilton671.tumblr.com/post/158636270075
via Zoe Hamilton

The FBI Has Been Investigating Trump’s Russia Ties Since July

The FBI Has Been Investigating Trump’s Russia Ties Since July
Breaking with DOJ tradition, Comey makes official the Russia investigation Trump has long decried as “fake news.” The post The FBI Has Been Investigating Trump’s Russia Ties Since July appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/fbi-director-comey-confirms-investigation-trump-campaigns-russia-ties/
from Tumblr http://zoehamilton671.tumblr.com/post/158634374260
via Zoe Hamilton

Cardiff man admits terrorist charges after posting encryption instructions on Islamic blog

Samata Ullah, a resident of Cardiff, pleaded guilty to five terrorism charges, including developing an encrypted version of an Islamic website and posting videos explaining how to use encryption

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415125/Cardiff-man-admits-terrorist-charges-after-posting-encryption-instructions-on-Islamic-blog


from Tumblr http://zoehamilton671.tumblr.com/post/158626609810
via Zoe Hamilton

IBM cognitive assistant to help manage and secure devices

IBM has announced a cognitive assistant powered by IBM Watson to help businesses manage and secure endpoints, including devices making up the internet of things

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415135/IBM-cognitive-assistant-to-help-manage-and-secure-devices


from Tumblr http://zoehamilton671.tumblr.com/post/158626609630
via Zoe Hamilton

Friday 17 March 2017

Tips For Getting A Job In IT With No Experience?

What Experience Do You Have?So… you want to get a job in the IT world? You’ve heard the buzz about Cyber Security or becoming a network administrator and  how much money these jobs are paying!

The BIG question is… how do you get the job! More so how do you get the training for the job?

That ends up being the big issue. With some many areas of focus where do you start?

Regardless of what area in the Info Tech world you want to go into, the below suggestions will get you ready for all of them! You just need to put in the time.

So two BIG things!

  1. Education/Training/Certifications
  2. Experience

It is the classic CATCH22… you can’t get the job because you don’t have the experience, but how can you get the experience if you don’t get the job! Aghhhh very frustrating.

After I was in the work force and got my hands dirty, troubleshooted live problems etc…  I knew that I knew more than anybody coming in off the street that had  certain certifications or degrees and no real on the job experience. But on the flip side getting the certifications shows that you have the knowledge and the understanding to figure out specific certification oriented issues. Employers want to see those certs and hear those BUZZ worlds!

Regardless of what certifications you may have, is someone going to hire you to run an 500 user Exchange Server or become a Network Admin for a 100+ user company? Most likely no!

You also can’t expect to get a big job like that coming right out of school or after getting some certs, so keep that in mind. Now don’t get depressed here! It will all come together for you.

OK So What Do You Do?

  • Over the years I have talked to a lot of people in the industry. Heck there were guys that were in my Tech School class that didn’t have jobs 6 months after we got out and I did! These guys were wayyy… smarter than me, but I focused and did what I am going to show you below and I can honestly tell you I am one of the top 3 successful people out of my class.

Here are a handful of things you can do that will put you in a better position you for a job in the long run whether you are in school or thinking of a career change.

Education: Now pay attention… take notes here…

If you are just deciding your career and have not been to college, then you are better off going to some sort of technical school that will be focusing solely on your career path. I went to a 4 year college because I had the opportunity and got my BA in Communication, which had nothing to do with my current career…. because honestly I had no idea what I wanted to do. Sure I am glad I went, but I literally graduated college, then went to CHUBB institute of Technology full time for 5 months and learned more there then I did in college… because I actually paid attention 😉

  • So a technical school does a few things for you…. it gets you hands on experience and you dive right into learning! It also puts you  around people that are obviously doing the same and studying the same things, so you can really immerse yourself in the work and bounce ideas/get help from other students.
  • Depending on the particular niche you are studying you will want to start thinking about what certifications you should get. I think CompTIA exams are a great way to get your feet wet.  As soon as I finished CHUBB I went right after my A+ & Network + certs. Now… I went into school basically knowing nothing about computers, networks, security etc… I was good with them, but had no knowledge. If you already have some knowledge you might be able to bang out some of those certs while you are in school or whenever you want.
  • Get the certs! When you do land the big job be sure to look into continuing education and if the company allows it then get more certifications and get them to pay for it 😉

Experience: Think outside the box… I did and it paid off!

Ah the tough one! Again you need to remember that the first job you get might not be that Network Admin or Security Admin job…. in fact I pretty much guarantee it won’t! This is where you have to think outside the box and create opportunitiesdon’t wait for  them!

  • Start a blog on your niche…. “you can do this while at school” write about what you are learning… problems you are solving… and post about problems to see if others can help you. This goes on the RESUME! A potential employer can look at this and see the value in your information… just make sure it is actually good 😉 Oh and hey now you are a webdesigner/blogger!
  • Start an LLC… it doesn’t cost much. Check out LegalZoom and set yourself up. Why do this?
    • First off it shows initiative and you are now the CEO of your own company! Go out and get some clients… it is not as hard as you think
    • This is exactly what I did… I was building computers for people, setting up their home networks, securing their wifi… and oh Good Lord help me… updating their Windows XP to Service Pack 1 via dial up!! Agh… you learn a lot waiting for hours lol!
    • Seriously though, it all goes right on the resume! This also allows you to have some solid references. I must have had a dozen references I could give a potential employer to call and each one was super happy with my services because I made their lives easier! It is a win win!
  • Get an internship or even a low paying, maybe even volunteering/tagging along job with someone who knows what they are doing! That is worth its weight in gold! When you surround yourself with people who deal with the real world situations in IT you are going to learn a lot real fast. You are also going to learn what matters and what doesn’t and how half the stuff you learned in your classes and getting your certs are never like real time experience 😉
  • It can be tough, but you have to put yourself out there… visit the local computer shop and see if you can hang around or do some busy work for them like installing operating systems or resetting routers etc… whatever it is get your foot in the door and make those connections. All of this is resume material that will put you one step closer to your dream job.

Below I talk about how to put this altogether in your resume, but first here is a quick story about my journey. Maybe it can give you some ideas or at least motivation…

My Climb To IT Greatness… To Me At Least… 😉

So I graduated from CHUBB and of course I expected to get some job making you know like 50K  + job a year… “this was 2001” by the way, but that did not happen.

Now all of the above stuff I wrote about… I pretty much did, I was running my own LLC, I had a few clients… I never did start a website “it was harder back then ;-)”, and I was always just learning. I had my first job interview with a company that was more or less a computer rental company. So a company would need 30 laptops or 30 desktops all with the same set up delivered to them for training or some temp project etc… we would set them up and them deliver them. Well the head guy would set them up… I would deliver them and set them up. So it was 80% delivery and 20% tech, but it was cool. I learned along the way and a lot of times we ran into issues getting them set up and functioning on the networks and I was able to use the skills I learned to solve the problem. Good times…

It wasn’t the dream job, but it was a job! It was better then sitting at home crying about not getting hired like a lot of other people from my class were doing. They were turning down jobs like that! Don’t do that! Go for the interviews for practice, take the job if nothing else is happening, and if another opportunity arrives then take it!

As luck would have it I had a friend who was working for Bed Bath & Beyond in their tech support and got me an interview. I also had a chance to interview for a Fortune 500 company that my mother worked for. She knew the woman who managed the IT department and they had a summer time help desk position available. So… the BBB job was full time, benefits etc… all that good stuff. Mainly learning how to work with their company software and support things BBB specific. The summer time gig was supporting 500+ users with 3 other guys dealing with all sorts of technologies. They also had network admins, sys admins, and exchange admins working there. I was offered both jobs!

Which do you think I took? The full time, more money/benefits job or the 3 month summer help desk gig?

I took the help desk gig of course! It was the best decision of my life! I was surrounded by 3 other guys in the help desk that taught me a ton!! I was around all the other admin guys that were really cool and I got to help them out here and there and pick up a few things. I learned a lot of skills in a lot of different areas. It really helped me see what I wanted to do!

I never got offered a full time job, because there wasn’t a need for one at the time, but I took those skills I learned and made some great connections/references and was able to add to my resume that I worked at a Fortune 500 company.

After that I took a quick gig at a “learning center” actually teaching people computers lol… it was horrible, but it was a job and I literally quit 3 weeks in. I went back to doing my own thing and helping out another guy I knew who ran his own IT company. I was able to help him here and there and in particular with one company. That company decided they wanted to hire a full time IT guy so I jumped at the opportunity.

I was intimidated because I felt I did not have the experience to be the HEAD IT DUDE for about a 30 employee company that had its own exchange server, blackberry server, firewall, and all the other things companies need to run! I would have to be the guy to run it all! It was full time, full benefits etc… Of course I got the job!! 😉

I still remember during the interview I was asked about the position I had at the help desk and what I did. The answers I was able to give them from that experience pretty much locked up the job for me!

So I was there for a long time, did a lot of cool things, streamlined a lot of things, and saw a lot of things change over the years… blackberry server… what?? lol 😉

Anyways I hope that just paints a picture for you and you can see how a potential career in the industry can develop.

OK Let’s Write That Resume

So I have not written a resume in probably 10 years! Yes seriously so as far as formatting and all that fun stuff I have no idea! I have been lucky enough to take my knowledge and not worry about keeping my resume up to date, but here are some things to remember.

  • You need to put it all on there! Depending on the position you are applying for you will of course want to focus on those skills, but list everything.
  • What I mean by that is this…. if you listened to me and started an LLC and had some clients and you happened to secure their Linksys Router or their Unifi Access point then you write on that resume those models you dealt with. If you dealt with specific antivirus or malware removal software list it. If you had to fix or upgrade a Dell Poweredge server then list the exact model of the server.
  • Doing this shows your experience, but you never know… that potential employer might realize they are using Unifi Access points and when they see you have dealt with them that is a win win! Experience pays off!
  • List all those Certifications
  • List that website you built
  • The more detailed you are the more chances you have of the potential employer matching that up with something specific which is more likely to get you hired.

Well.. I know I can be long winded, but  there is a lot of good information here and it is all 100% true! I loved those times when I was learning. I hope it helps you.

If you have any questions or more tips to add please leave them below in the comments section! I would love to hear them and also help you out in anyway I can! Heck I could even add you as an author on the blog if you were interested in writing…. Now you can add Author @cybersecurityportal.com to the resume 😉

The post Tips For Getting A Job In IT With No Experience? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/tips-for-getting-a-job-in-it-with-no-experience/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158520890535
via Zoe Hamilton

Cyber Security Practices That Aren’t Doing You Any Good… Sort of…

cyber security practices

popular cyber security practices that aren’t protecting you at all… sort of…

Standard protective and defensive measures are extremely important for a small business or organization due to cyber criminals increasingly targeting these entities. But are your standard security measures really working for you?

You’ll be surprised to know that some of the most common and popular standard measures aren’t really doing anything for you. We have compiled a short list of protective measures that people think are effective, but in reality, they’re really just not protecting them.

High-end router’s don’t guarantee 100% protection

  • You may think buying off a high-end router that costs a lot of money should be enough to protect your network from intrusions. You’re wrong. The truth is routers come with firmware that is hard to update. A lot of people don’t update their routers which open up to malware attacks. Expensive routers are good for their throughput, security wise they’re just not enough.

Changing Password or choosing a strong one is not safe

  • Unfortunately, no matter how hard your password is to guess or no matter how frequently you change your password, it might not be enough to protect your system. Hackers can even break through the strongest of passwords by tricking you through various phishing scams, but of course be sure to change often and use a strong one. >>> Use our PASSWORD GENERATOR in the sidebar to generate a strong password >>

Anti-Virus software don’t give you complete security

  • There was a time when putting up a good anti-virus software on your computer would protect it against all the threats lurking out there. Times have changed now and cyber criminals have found various ways to break through anti-virus software. Now you need multiple security software to protect against threats that are not detectable by anti-virus software alone.

Firewalls don’t protect you anymore than your anti-virus software

Another big misconception these days is setting up a strong firewall is enough to protect your network against cyber criminals. Most malware nowadays can easily pass through firewalls to breach your system. Without a cybersecurity professional constantly protecting your systems using various security methods, even the strongest firewall can’t stop a breach.

Take this with a grain of sand sometimes because you do need the above, but just because you install these products does not guarantee safety. It is always good to have a site audit or penetration tester evaluate your configuration.

The post Cyber Security Practices That Aren’t Doing You Any Good… Sort of… appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cyber-security-practices-that-arent-doing-you-any-good/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158515750110
via Zoe Hamilton

Moving forward and looking back

This is the fourth and last in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s University Belfast

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Moving-forward-and-looking-back


from Tumblr http://zoehamilton671.tumblr.com/post/158515680950
via Zoe Hamilton

NCSC commits to greater diversity

GCHQ’s National Cyber Security Centre is planning several initiatives to ensure more women are attracted to and remain in technology roles, particularly cyber security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415065/NCSC-commits-to-greater-diversity


from Tumblr http://zoehamilton671.tumblr.com/post/158515680770
via Zoe Hamilton

Cyber security is a huge opportunity for UK business, says NCSC

NCSC engagement director Alex Dewdney is leading government’s new approach in working with UK industry to build a national cyber security community and capability

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415052/Cyber-security-is-a-huge-opportunity-for-UK-business-says-NCSC


from Tumblr http://zoehamilton671.tumblr.com/post/158510462550
via Zoe Hamilton

Thursday 16 March 2017

Government to ramp up help for UK cyber security industry

Government, in partnership with industry, is pursuing a range of initiatives aimed at establishing a UK cyber security ecosystem, developing skills and products and boosting exports, says DIT’s Conrad Prince

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415017/Government-to-ramp-up-help-for-UK-cyber-security-industry


from Tumblr http://zoehamilton671.tumblr.com/post/158483783010
via Zoe Hamilton

UK holidaymakers’ data breach highlights need to be proactive

Security experts say the data breach at travel industry association Abta underlines that no organisation is immune from cyber attack and that data holders and consumers should be more proactive about data protection

from ComputerWeekly: IT security http://www.computerweekly.com/news/450415005/UK-holidaymakers-data-breach-highlights-need-to-be-proactive


from Tumblr http://zoehamilton671.tumblr.com/post/158478721720
via Zoe Hamilton

Most companies wide open to “cataclysmic” hack, especially after M&A

Companies are leaving themselves wide open to cyber crime, especially after M&A, so companies need to start enabling cyber-security professionals before they face serious problems

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Most-companies-wide-open-to-cataclysmic-hack-especially-after-MA


from Tumblr http://zoehamilton671.tumblr.com/post/158478721595
via Zoe Hamilton

Finance firms are vulnerable to cyber attacks, so why do customers think they are secure?

The public are overly confident in the ability of banks and financial institutions to protect their data, but that will change when mandatory reporting comes in next year under the General Data Protection Regulation

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Finance-firms-are-vulnerable-to-cyber-attacks-so-why-do-customers-think-they-are-secure


from Tumblr http://zoehamilton671.tumblr.com/post/158473203760
via Zoe Hamilton

US accuses Russian spies of directing Yahoo breach

US authorities have arrested a man in Canada who has been charged alongside two Russian intelligence officers and a Russian hacker in connection with a 2014 data breach at Yahoo affecting 500 million accounts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414977/US-accuses-Russian-spies-of-directing-Yahoo-breach


from Tumblr http://zoehamilton671.tumblr.com/post/158473203525
via Zoe Hamilton

Wednesday 15 March 2017

Raising cyber security grasp is biggest challenge, says GCHQ chief

Everyone has a role to play in cyber security, and the NCSC has the right pedigree to co-ordinate and balance the efforts of government, industry and academia, says GCHQ director Robert Hannigan

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414939/Raising-cyber-security-grasp-is-biggest-challenge-says-GCHQ-chief


from Tumblr http://zoehamilton671.tumblr.com/post/158450404030
via Zoe Hamilton

WhatsApp Hack Shows That Even Encryption Apps Are Vulnerable in a Browser

WhatsApp Hack Shows That Even Encryption Apps Are Vulnerable in a Browser
Web-based vulnerabilities in end-to-end messengers demonstrate why it may be safest to stick with the mobile versions of messaging apps. The post WhatsApp Hack Shows That Even Encryption Apps Are Vulnerable in a Browser appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/whatsapp-hack-shows-even-encryption-apps-vulnerable-browser/
from Tumblr http://zoehamilton671.tumblr.com/post/158447522540
via Zoe Hamilton

The UK needs more women in cyber security, says GCHQ chief

The need to recruit more women into cyber security has come under the spotlight at CyberUK as a study shows the UK infosec industry has one of the lowest proportions of women and the highest gender pay gaps in the world

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414912/The-UK-needs-more-women-in-cyber-security-says-GCHQ-chief


from Tumblr http://zoehamilton671.tumblr.com/post/158439656095
via Zoe Hamilton

US set to charge four hackers for Yahoo breaches

Three Russians are reportedly among four hackers US authorities believe to be linked to data breaches at Yahoo affecting more than a billion accounts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414908/US-set-to-charge-four-hackers-for-Yahoo-breaches


from Tumblr http://zoehamilton671.tumblr.com/post/158434189025
via Zoe Hamilton

UK identity fraud reaches record levels

The UK fraud prevention service is calling for better education about fraud and financial crime as identity fraud, which is often cyber-enabled, hits the highest levels ever recorded

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414904/UK-identity-fraud-reaches-record-levels


from Tumblr http://zoehamilton671.tumblr.com/post/158430737675
via Zoe Hamilton

Tuesday 14 March 2017

Recruiting women key to closing cyber security skills gap, say experts

The European cyber security industry has one of the lowest proportions of women and the highest gender pay gaps in the world, the latest Global Information Security Workforce Study shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414802/Recruiting-women-key-to-closing-cyber-security-skills-gap-say-experts


from Tumblr http://zoehamilton671.tumblr.com/post/158416600245
via Zoe Hamilton

NCSC chief calls for UK collaboration on cyber security

The National Cyber Security Centre is unashamedly ambitious in aiming to make the UK the safest place to do business online, which chief Ciaran Martin sees as an achievable goal

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414833/NCSC-chief-calls-for-UK-collaboration-on-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/158398581985
via Zoe Hamilton

CIO interview: Simon McCalla, Nominet

Nominet, the registry for more than 10 million of the UK’s internet domains, is expanding into the internet of things and internet security services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414754/CIO-Interview-Simon-McCalla-Nominet


from Tumblr http://zoehamilton671.tumblr.com/post/158392579120
via Zoe Hamilton

Cyber threat to UK business significant and growing

The UK’s NCSC and the US’s NSA publish a joint report on the cyber threats facing UK businesses, outlining the best response strategies

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414801/Cyber-threat-to-UK-business-significant-and-growing


from Tumblr http://zoehamilton671.tumblr.com/post/158389534675
via Zoe Hamilton

Make identity management a foundation for cloud deployments

Every SaaS product has its own way to authenticate users, making it hard to keep track of which ones have access to which services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414759/Make-identity-management-a-foundation-for-cloud-deployments


from Tumblr http://zoehamilton671.tumblr.com/post/158389534555
via Zoe Hamilton

Monday 13 March 2017

The true impact of a cyber breach on share price

As cyber security breaches become increasingly common, a security consultant explores how recent headline breaches have affected company valuations

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/The-true-impact-of-a-cyber-breach-on-share-price


from Tumblr http://zoehamilton671.tumblr.com/post/158362580275
via Zoe Hamilton

Computer Security Mistakes You Should Stop Making Now

Computer security mistakes that you need to stop

A lot of us take the internet very lightly and believe it has nothing more than social media, a bunch of videos and a lot of reading material. We often ignore the dangers that lurk in the online world and hence never attempt to secure our computers properly.

If you aren’t already protecting your computer by increasing security, you are becoming an easy target for cyber criminals who can obtain your precious data including credit card information.

Here are some computer security mistakes you are probably making.

You got no anti-virus on your system

  • Having a proper anti-virus on your system is absolutely critical for the basic security of your system. There are tons of anti-virus software available, but we recommend installing a software from a known company. Just make sure you don’t end up installing a software that you randomly found on the internet.
  • Check out http://www.pcmag.com/article2/0,2817,2388652,00.asp they have a big list. Any would be safe to use, but loof for something that includes Malware Protection. AVAST is #1 on their list for a reason!

Don’t install unnecessary software

  • There are times when you download a software and install, you get asked to install an additional software. A lot of third party software developers can include extra software that automatically installs with their software. You need to pay attention and not let the program install additional software.

Change your password occasionally

  • The biggest overlooked security mistake is not changing your password occasionally. We tend to rarely or never change our passwords. Remember, your password can easily be acquired by hackers if you are not careful. So try to make sure your password is strong and is occasionally changed now and then.

You keep the same password everywhere

This is one of the most common mistakes people make these days. They usually keep one password for everything they are using. Now imagine if a hacker gets hold of this password, he also gets access to your email, your private accounts, and your system. Make sure you keep different passwords for all the platforms you are using.

The post Computer Security Mistakes You Should Stop Making Now appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/computer-security-mistakes-you-should-stop-making-now/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158362521530
via Zoe Hamilton

NCC Group launches bounty for open source security flaw fixes

Firm hopes bounty scheme will inspire others to do the same to encourage security specialists to make open source software more secure

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414742/NCC-Group-launches-bounty-for-open-source-security-flaw-fixes


from Tumblr http://zoehamilton671.tumblr.com/post/158351852150
via Zoe Hamilton

Listen to ‘Tech Support’ Scam Calls That Bilk Millions Out of Victims

Listen to ‘Tech Support’ Scam Calls That Bilk Millions Out of Victims
To get to the bottom of a devious form of phone-based fraud, a group of researchers scammed the scammers. The post Listen to ‘Tech Support’ Scam Calls That Bilk Millions Out of Victims appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/listen-tech-support-scam-calls-bilk-millions-victims/
from Tumblr http://zoehamilton671.tumblr.com/post/158350216315
via Zoe Hamilton

NCSC to educate UK politicians on the cyber threat

The National Cyber Security Centre is to deliver tailored seminars for politicians on how to protect their email communications and voters’ data to defend against cyber threats to the political system

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414739/NCSC-to-educate-UK-politicians-on-the-cyber-threat


from Tumblr http://zoehamilton671.tumblr.com/post/158348629135
via Zoe Hamilton

Friday 10 March 2017

Navigating those early stages: research in its many forms

This is the third in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s University Belfast

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Navigating-those-early-stages-research-in-its-many-forms


from Tumblr http://zoehamilton671.tumblr.com/post/158246885590
via Zoe Hamilton

Here Are The 6 Best Security Certifications For 2017

best-security-certifications-2017Security breaches are increasing in size and number day by day which indicates that there is a large cybersecurity talent gap. Statistics have revealed to many companies the threat they face through cyber security and they are worried.

And when companies get worried, they open up vacancies for cyber security professionals to jump in and help them secure their networks. But how do you know which kind of security professionals they are looking for?

It’s simple, you look at the security certifications that are in demand and you’ll get the answer. We are providing you a list of hottest security certifications below that are guaranteed help you find a position as a security professional in 2017.

CISSP – Certified Information Systems Security Professional

  • The CISSP specializes in information security education and is a certification that will help you acquire the right knowledge to help manage data and network security at many companies.
  • How To Become Certified – Official Links >>>

CISM – Certified Information Security Manager

CRISC – Certified in Risk and Information Systems Control

  • This certification will help you in understanding how IT risks are related to an organization. By the time you finish this certification, you’ll have plenty of knowledge to handle corporate level risks.
  • How To Become Certified – Official Links >>>

ECSA – EC – Council Certified Security Analyst

  • This certification will make you an ethical hacker and will help you develop your skills as a penetration tester, one of the most sought out professions in the corporate sector. Plus you’ll get to fiddle around with the latest hacking technologies and tools.
  • How To Become Certified – Official Links >>>

CompTIA Security+

  • The security+ certification is one of the safest routes to take if you aren’t sure what you want to achieve in your career as a cyber security professional. It is a globally trusted certification that is considered best practice in IT security covering most of the essentials of network security and risk management.
  • How To Become Certifiied – Official Links >>>

CISA – Certified Information Systems Auditor

  • CISA focuses on monitoring skills and system control. It is also globally recognized standard providing expertise in examining and setting up technology controls. You’ll also be able to deal with vulnerabilities at the enterprise level.
  • How To Become Certified – Official Link >>>

No matter which security certification you choose to go with, one thing is pretty clear; the trends show that cyber threats will keep increasing in numbers and size. Which means the need for cyber security professionals will only rise.

The post Here Are The 6 Best Security Certifications For 2017 appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/here-are-the-6-hottest-security-certifications-for-2017/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158237476310
via Zoe Hamilton

Paying ransomware attackers perpetuates attacks, says researcher

Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414666/Paying-ransomware-attackers-perpetuates-attacks-says-researcher


from Tumblr http://zoehamilton671.tumblr.com/post/158233687945
via Zoe Hamilton

Tech firms to get first look at CIA hacking tools

WikiLeaks has promised to show tech firms details of what it claims is a leaked arsenal of CIA hacking tools to enable them to prepare fixes before any more are made public

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414638/Tech-firms-to-get-first-look-at-CIA-hacking-tools


from Tumblr http://zoehamilton671.tumblr.com/post/158225807750
via Zoe Hamilton

Thursday 9 March 2017

Huge demand for government cyber defence apprenticeships

A rush for cyber defence apprenticeships shows young people are looking to cyber security as a viable and interesting career option

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414604/Huge-demand-for-government-cyber-defence-apprenticeships


from Tumblr http://zoehamilton671.tumblr.com/post/158212814395
via Zoe Hamilton

GDPR to place extra burden on ICO, says commissioner

The GDPR and global enforcement work will place an extra work burden on the ICO, but government has collaborated on a new funding plan that is awaiting parliamentary approval

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414588/GDPR-to-place-extra-burden-on-ICO-says-commissioner


from Tumblr http://zoehamilton671.tumblr.com/post/158194618220
via Zoe Hamilton

Danish consumer council refers Google to Data Protection Agency

Danish consumer rights protection organisation has referred Google to regulator over its personal data storage policy

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414581/Danish-consumer-council-refers-Google-to-Data-Protection-Agency


from Tumblr http://zoehamilton671.tumblr.com/post/158194618070
via Zoe Hamilton

What is Ransomware

Learn everything about ransomware

If some of your files are no longer accessible because they have been locked, then you might have just become a victim of Ransomware. But ransomware isn’t just simply locking files and asking for money to provide unlock key, it is much more than that.

So What Is Ransomware Really?

In popular internet culture, ransomware comes in two different forms.

Locker Ransomware – the kind of ransomware which locks the user out of the operating system they are using. This makes it impossible for the user to access his/her desktop or use any applications or files. In this case, the files are not encrypted, but the hacker can still ask for a ransom if you want your system unlocked.

Encryption ransomware – this kind of ransomware comes with advanced encryption algorithms which basically block all your system files and then demands ransom in return for a key to unlock all the files that have been locked.

Ransomware is a malware in nature, so it will always stay hidden from an anti-virus. But there are some key attributes that make it different from the rest of malware. These are:

  • Ransomware is capable of encrypting any kind of file. These include music files, pictures, videos, word documents, presentations and more.
  • Ransomware’s encryption is impossible to break. In simple words, if your files get locked, you won’t be getting them back until you pay the ransom.
  • Ransomware also has the power to change your file names. This technique is often used by hackers to hide away important data in the masses of other files on your system. Sometimes it is also used to confuse the victim into believing that important data has been locked.
  • It almost always sends a message to you or a picture that tells you your files have been encrypted and you won’t be able to unlock them unless you pay the demanded ransom.
  • Ransomware can also change the extensions of your file. For example, .doc can be changed to .pdf.
  • It will mostly demand ransom in the form of bitcoins. This form of currency cannot be tracked by cyber security professionals or law enforcement agencies so it has become the number one choice of currency for cyber criminals.
  • Ransomware is time locked. This means that if you do not pay the ransom on time, your data can be destroyed forever. This actually adds a lot of psychological strain on the victim.
  • Ransomware cannot be detected by anti-virus because it uses complex evasion techniques that anti-viruses are incapable of detecting.
  • The malware can spread to other systems through a local network to lock more files and increase ransom.
  • Hackers can turn the infected system into a botnet which they can use in the future for more attacks
  • Ransomware can sometimes change the language of the image or message it sends to local language which increases the chances of the ransom being paid.
  • Ransomware can also extract important data such as passwords, usernames, email addresses and credit card numbers from the system it infects.

Ransomware is evolving every day which means that the things it is able to do are increasing day by day, making it even more threatening.

Who are the top targets of ransomware?

  • If you think ransomware usually targets businesses and organizations, you are wrong. Hackers are targeting almost anyone they can using ransomware these days and home users are on the top of their list.

This is for some very alarming reasons:

  • Home users usually don’t keep a backup of the data. This means if data is important to them and it has been locked, without a backup, they are never going to get these files back. So they are easily led into paying the ransom.
  • A home user is also unaware of how to properly protect their systems from malware. This makes them an easy target for the hackers to send out ransomware.
  • Home users also do not keep their systems up to date. A lot of people tend to ignore security updates which make their systems vulnerable to attacks from ransomware.
  • Home users are also only dependent on anti-viruses and are not aware that ransomware is a malware and cannot be detected by anti-virus.
  • But this doesn’t mean businesses are often ignored. They are also targeted because:
  • Businesses have the kind of funds ransomware attackers are mostly attracted to.
  • Hackers are clever and know that if they acquire data from a business, the business will have to pay no matter what.
  • Ransomware is also popularly used against businesses because they employ a lot of computers and ransomware can easily spread and lock more systems to increase the amount of ransom.

Whether you are a business or a home user, you should know that the threat of ransomware is real. The only real way to help you protect from ransomware is to prevent the attack in the first place by upping your cyber security.

FREE LIST OF RANSOMWARE REMOVAL TOOLS & SOFTWARE

First OFF! Always have a backup! If you do not you are just asking for trouble! With a backup you can wipe out your entire computer and reinstall to be safe, but still have your files…. so check out Carbonite – Click Here >>> simple, safe and affordable.

  • Malwarebytes: Always been a happy user and now they have live ransomware protection. – Learn More >>
  • Trojan Remover From SimplySup: Another I have personally used for years. – Learn More >>
  • RansomFree: Free and seems to work well.. have installed it Learn More >>>

Loads of info…. there is a lot out there MajorGeeks has a lot of info: http://www.majorgeeks.com/mg/sortdate/ransomware_removal.html and so does techradar: http://www.techradar.com/news/the-best-free-anti-ransomware-tools

Again hoping you are trying to prevent this and not looking after the fact! Remember what I mentioned above… BACKUPS! You better have them!

 

The post What is Ransomware appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/what-is-ransomware/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158193423020
via Zoe Hamilton