Cyberattacks and How To Protect Your Computer and Data – Part 3 of 3

  If you have been following this blog series, you know that the first blog discussed the cyberattack kill chain and how hackers target individuals and systems and the second blog covered common cyberattacks and how they are perpetrated and identified. In this final post, I am going to discuss what users can do to harden their

Cyberattacks and How To Protect Your Computer and Data – Part 2 of 3

  In my first blog, I discussed the cyber kill chain and how hackers move through predictable steps to launch an attack against a target. In that blog, I used the example of an author who was targeted because of their controversial writings and the author’s system was compromised with ransomware. In this second post,

Cyberattacks and How To Protect Your Computer and Data – Part 1 of 3

  Cyberattacks and data breaches are unfortunately commonplace in the daily news cycle. Many of us have had our personal, healthcare, and financial data breached so much that we are used to receiving letters notifying us of unauthorized disclosures or getting signed up for yet another credit monitoring service. Cybercrime is out of control and

Why Multifactor Authentication is so Important

  As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure.  While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could

Sitting in the Hot Seat: OPM Director Answers Tough Questions about 2015 Breach

  The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level.  The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering.  For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this