720-891-1663

NIST Revises Rules For Protecting Unclassified Information in Contractor Computers

NIST Special Pub 800-171 sets the rules for protecting information that defense contractors create and/or store called “Controlled Unclassified Information” or CUI.  CUI includes the information that would be very enticing to foreign governments such as Russia, China and others. SP 800-171 was originally released last year and NIST publications usually have a 3 to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Google Adds Easy iOS Management Option for G-Suite Users

For those Google G-Suite (AKA Google Apps and Google Apps for Work) users, Google has released a new option for managing iPhones and iPads. What is great about it is that it does NOT require installing an agent on the phone or pad. Google calls it the Basic Mobile Management option for iOS and it […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Broker Dealer Fined $650k Because Third Party Provider Was Breached

While this post should be of direct interest to Broker Dealers, it really applies to anyone who outsources information services. You can delegate the task but not the responsibility. In this case, the broker dealer used a cloud provider to store customer information.  This is no different, for example, than a mortgage company using a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

This Security Camera Was Hacked in How Many Seconds After Being Put Online?

OK, I will give you the punchline upfront.   According to Tech Crunch, Robert Stephens, a tech industry veteran, put a WiFi connected security camera on the Internet and was hacked in …. 98 Seconds. In 98 seconds it is highly unlikely that you could even get logged in to the camera, never mind change […]

Continue reading → [DISPLAY_ACURAX_ICONS]