Most people know about OpenAI’s ChatGPT, funded, in part, by a massive infusion of cash from Microsoft. People also are aware of the privacy concerns of GPT-type tools. In many cases, the damage is not intentional, but accidental. People submitting sensitive queries without thinking about it. Also, as more and more software incorporates GPT-tools under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many small businesses and a lot of large ones use third party IT service providers called MSPs or Managed Service Providers. In almost all cases, these MSPs have the keys to your IT universe. They have access to your data. They also have access to all of your access rules. If they also help you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Gov Warns of Ransomware Attacks on Pipeline Operations DHS’s CISA issued an alert this week to all U.S. critical infrastructure that a U.S. natural gas compressor station suffered a ransomware attack. While they claim that the attackers did not get control of the gas compression hardware, they did come damn close. The ransomware took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As my son likes to say, nothing it bulletproof – it all depends on the size of the bullet. Likewise, nothing is 100% secure (except the computer that has never been taken out of the box) but your actions can improve the odds dramatically. Here are some recommendations from Dark Reading. Most people will pick […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Department of Defense is probably the largest software development (and hardware development) organization in world but unlike say Microsoft or Cisco, almost all of the development is performed by third parties – the so called defense industrial base or DIB. It is also likely the number one target of nation state hackers since a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is an article in Slate that suggests that we should treat public computers like we treat public restrooms – very cautiously. I had never made that analogy before, but I do like it. Both public restrooms and public computers may harbor germs and viruses. Both may have been frequented in the recent past by […]
Continue reading →
[DISPLAY_ACURAX_ICONS]