Facebooktwittergoogle_plusredditlinkedinmailFacebooktwittergoogle_plusredditlinkedinmail

 

On this page you will find resources related to Cybersecurity and the wide range of topics that fall under this category.  In my current role, I work as a contractor to the U.S. Federal Government as the IT Operations & Cyber Security Manager and hold a Top Secret security clearance.  The agency I work for has an essential national security mission and a presence across the United States.  In my role I become involved in digital forensics, incident response, malware reverse-engineering, vulnerability management, security engineering, network security, purchasing, budgeting, metric development, and other technical and administrative cybersecurity functions.

 

Windows 10 Parental Control Settings

  I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10 (available here), so I decided to follow on with another post on how to setup parental controls with Windows 10.  While Microsoft has had some good parental control features with Windows 7, when Windows […]

Posted in Cybersecurity, Information Technology | Tagged , , | 4 Comments

iOS 10 Parental Control Settings

  I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks.  Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the […]

Posted in Cybersecurity, Information Technology | Tagged , , , , | 4 Comments

Who Are You Allowing in Your House at Night?

  If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How […]

Posted in Cybersecurity | Tagged , , | Leave a comment

Cybersecurity Considerations with Bring Your Own Device (BYOD) Implementations

  Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them.  BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives.  […]

Posted in Cybersecurity, Information Technology | Tagged , , , | Leave a comment

Reducing Classified Spillage Incidents

  A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information.  Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks. […]

Posted in Cybersecurity | Tagged , | Leave a comment

Why Multifactor Authentication is so Important

  As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure.  While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could […]

Posted in Cybersecurity | Tagged , , , , | Leave a comment

Sitting in the Hot Seat: OPM Director Answers Tough Questions about 2015 Breach

  The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level.  The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering.  For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this […]

Posted in Cybersecurity | Tagged , | Leave a comment

6 thoughts on “Cybersecurity

  1. Dear Josh,

    I am writing to ask you for a recommendation regarding my daughter’s online (and/or texting, phones, etc) activity on her iPhone, iPad and MacBook.

    I recently came across TeenSafe but my daughter dose not have a separate ID and Password for iTune and it seems like that is the way they monitor child’s activity. Giving them my ID and password (that I share with my daughter dose not seem like good idea or even helpful).

    I did a free trial of Qustodio but it did not seem to be accurate. For example my daughter does not even have a facebook account and Qustodio was reporting activity on facebook.

    So I am wondering what your recommendation is.

    thanks,
    Grateful
    P.S. I am sorry for writing here. My email to you returned suggesting “The e-mail message could not be delivered because the user’s mailfolder is full”

  2. Thank you very much for your response. We would definitely want to buy/use a drone. Is there a device similar to wireless sniffer that only detects the weakness of a network without having the capability of hacking/accessing inone’s data? The idea is to use the drone and that potential device on all the houses in our community and then alarm the owners if their network is “hackable”. As an alternative we may obtain consent of the neighbors to do so. But we prefer a device that is not able to access people’s data but can detect weakness in their network. I would appreciate your feedback.

    • Thanks – the implications of how drones can be used in cybersecurity is interesting. Depending on how much you want to spend, you could buy a drone and make it a wireless access point, showing how you could create a rogue access point, or place a wireless sniffer on the device like I wrote about in the article you mentioned and show how it could be used to sniff network traffic. If you did these, be sure to only do so on your personal network and be aware of your state’s cyber crime statutes.

Leave a Reply

Your email address will not be published. Required fields are marked *