720-891-1663

PCI Compliance

Dark Reading reported on Verizon’s PCI compliance assessment and I think the numbers are interesting, but not terribly unexpected (see article).  The actual report, all 84 pages, is available here. Most of the time (maybe always), when a business has an assessment done by a third party assessor, that company will do an interim assessment […]

Continue reading → [DISPLAY_ACURAX_ICONS]

New Malware Inventories Your Home Network Then Deletes Itself

Trend Micro has identified a new piece of malware (see article) that attempts to connect to your home router using default userids and passwords for a number of home router vendors.  It tries userids like admin, guest, root and user and passwords like admin, password and 12345678. The malware, named VICEPASS, scans for devices and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Simple Advice For Improving Your CyberSecurity Hygiene

While tips and tricks won’t make your organization bulletproof, it will help make you bullet resistant.  Here is a list from Boston Business News that is simple and right on. 1. IT Risk Assessment.  You MUST start with a risk assessment and if you are up for it, I would recommend a business risk assessment. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

A Different Perspective On Lenovo – It Is A Supply Chain Problem

While everyone is off beating up Lenovo and Lenovo, in turn, is beating up Komodia, I suggest everyone is missing the real problem. First of all, to make sure that no one is confused, this problem is not limited to Lenovo consumer laptops.  Komodia has over a hundred customers developing software, all of which put […]

Continue reading → [DISPLAY_ACURAX_ICONS]