What you need to know about 23 NYCRR 500.

By | Cybersecurity | No Comments

NY DFS 23 NYCRR 500 and You March 1, 2017 is quickly approaching.  This is the day when the State of New York’s Department of Financial Services (DFS) will officially enact the new cybersecurity requirements detailed in NY DFS 23 NYCRR 500.   What could this mean for your company?  If you do business in New York and fall under the DFS (Banking, Financial Services, Insurance, or even Educational Institutions), there is likely some work ahead that needs to be done.  While there are some exceptions in the new regulations, even the small firms have to pay attention. Establish a Cybersecurity Program If you…

Read More

Horton Hears A Host! – Part 3

By | Cybersecurity | No Comments

Welcome to the third post in our multi-part Seusstastic series on the real threats that face home networks, where we apply real-world enterprise grade protections to keep ourselves safe in the connected world. If you haven’t read part 1 or part 2, I highly recommend you take a few minutes and do so. We’ve covered how cyber thieves are constantly testing and scanning for vulnerabilities and what you can do to start acting like the bad guy – finding the systems on your network. We left you with the following point: devices that we previously would never have imagined to exist on a…

Read More

One Host, Two Hosts, Red Host, Blue Host – Part 2

By | Cybersecurity | No Comments

This is the second post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves safe in the connected world. First off – If you haven’t read part 1, I highly recommend you take 5 minutes and do so. In part 1, How The Grinch Stole… Your Information, I presented a simple construct: Cyber thieves are not only just outside your physical and digital homes, they are constantly testing and scanning for vulnerabilities. The argument is simple: Thieves will be thieves and you can’t just sit back…

Read More

How The Grinch Stole… Your Information – Part 1

By | Cybersecurity | 2 Comments

This is the first post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves save in the connected world. We’ll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn’t prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house’s windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on…

Read More

Why the MySpace Breach Matters, Even if MySpace Doesn’t

By | Cybersecurity | No Comments

You may have seen over the last few days reports of MySpace username and password combinations for sale on hacker spaces. MySpace was breached, and a possible 360 million accounts with 427 million passwords could have been stolen. Yes, MySpace has long since been dominated by almost all other social networks that you can think of today.  So who cares? You should. The first topic applies directly to the user – password reuse. We have talked about this numerous times in previous blogs, and the point still stands. The odds are favorable that either you or your coworkers have/had an account with MySpace….

Read More