The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by...
If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your...
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each...
Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them...
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro....