Unmanaged devices are devices that are neither owned by your company nor have your company’s security and management software on it. This includes personal phones and home computers used for work. Unfortunately, there is no simple solution to this problem. BUT, it is a huge hole in your security plan. You have no idea if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While some people are still hoping that CMMC will go away, the folks inside the Pentagon are working to get ready for it. Two cases: First, the office of the secretary of defense released a memo last month on the requirements for contractors regarding CMMC. Please contact me if you don’t already have a copy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the recent admission that the US Treasury Department was among the organizations compromised when vendor BeyondTrust was compromised, figuring out how to assess and doing the assessing of vendors, which today almost always includes technology, is clearly critical. A very large percentage of breaches we hear about involve vendors. For example: The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Marriott Hotels acquired the Starwood Hotel chain in 2016. Two years prior to the acquisition, hackers broke into Starwood’s systems. Marriott didn’t figure out that Starwood was compromised until two years after they acquired the chain. The only reason they figured it out then was they were migrating Starwood to Marriott’s system and discovered the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Important notes: Contact us if you need assistance *** NOTICE TO THE CMMC ECOSYSTEM *** 16 December 2024 CMMC Reaches Significant Program Milestone Today Updated guidance for the Ecosystem and defense contractors as CMMC Title 32 Final Rule enters into force The Cyber AB is recognizing today’s effective date of the Department of Defense’s codification […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI is great. Of course, anything that is great has to be immediately abused by hackers. Here are few popular AI based scams. VOICE CLONING If a hacker has 3 seconds of your voice, that is enough to clone it. Typically, they use calls of a loved one supposedly in distress, like in the hospital, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]