All Posts By

Jeremy Wheeler

How The Grinch Stole… Your Information – Part 1

By Cybersecurity

We’ll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn’t prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house’s windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…

Read More

Compliant Doesn’t Always Mean Secure

By Cybersecurity No Comments

“We need to be compliant so we can pass an audit!” This phrase makes us shudder. Forget being compliant because it is the right thing to do – or because it more times than not leads you down a path to better configuration management or stronger business processes. Many organizations view compliance as an obstacle they must overcome.  It impacts numerous business areas, and cybersecurity is no exception. From NERC-CIP to NIST to SOC 2, organizations scramble to make sure their policies and technologies meet these different standards. Whether they do this because it’s right or because it’s required is only a…

Read More

Home Network Segmentation – How deep does/should the rabbit hole go?

By Cybersecurity 2 Comments

Sometimes it is really nice being a tech geek. I have been obsessing, recently, about something that probably 99% of homeowners don’t even consider – the physical and logical design of my home network. Businesses consider network design all the time.  They consider the repercussions of cat5, coax and fiber.  They segment subnets and VLANs for various reasons. But as a tech geek, I have to bring my work home. Lately, though, I’ve been forcing myself to face a hard question — “at what point do I say, ‘that’s good enough.’?” A few weeks ago, the Security Now podcast covered a segment called…

Read More

Ransomware – Here We Go Again…

By Cybersecurity

A week ago news broke that a major energy infrastructure company that is responsible for delivering fuel to stations from Texas to New Jersey fell victim to a ransomware attack. The attack manifested in the operator, Colonial Pipeline, shutting down all operations of the nearly 5,500 mile long distribution pipe. Media outlets have focused on the consumer impacts – potential gas shortages likely to result in a higher fuel demand which could lead to price hikes. What the main news networks haven’t really discussed much is how an attack like this can occur, how often it happens, and what companies…

Read More

The State of IoT

By Cybersecurity, Internet of Things

This is the seventh article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  Revisiting the Topic Nearly 4 years ago I wrote a primer and deeper dive into the Internet of Things (IoT) explaining what it was and the security aspects you should consider when leveraging this class of technology. So how have things evolved in that time? What is still relevant and have things gotten better or worse? Well here’s an update… Consumer Exposure For one, you don’t really hear the term…

Read More