All Posts By

Jeremy Wheeler

Home Network Segmentation – How deep does/should the rabbit hole go?

By Cybersecurity 2 Comments

Sometimes it is really nice being a tech geek. I have been obsessing, recently, about something that probably 99% of homeowners don’t even consider – the physical and logical design of my home network. Businesses consider network design all the time.  They consider the repercussions of cat5, coax and fiber.  They segment subnets and VLANs for various reasons. But as a tech geek, I have to bring my work home. Lately, though, I’ve been forcing myself to face a hard question — “at what point do I say, ‘that’s good enough.’?” A few weeks ago, the Security Now podcast covered a segment called…

Read More

Compliant Doesn’t Always Mean Secure

By Cybersecurity No Comments

“We need to be compliant so we can pass an audit!” This phrase makes us shudder. Forget being compliant because it is the right thing to do – or because it more times than not leads you down a path to better configuration management or stronger business processes. Many organizations view compliance as an obstacle they must overcome.  It impacts numerous business areas, and cybersecurity is no exception. From NERC-CIP to NIST to SOC 2, organizations scramble to make sure their policies and technologies meet these different standards. Whether they do this because it’s right or because it’s required is only a…

Read More

Small Talk Isn’t Small When You Know Enough

By Cybersecurity No Comments

More times than not, people who fall victim to identity theft think about online transactions and recent credit card purchases that they made when trying to figure out how their information was compromised. Sadly, it really only takes some confidence, creativity, and a bit of luck to prey on someone and assume their identity. The computer is optional. Yes, it is important to protect your passwords. Yes, it is important to secure your network defenses. Yes, it is important to think twice before using that shady looking phone charging station. But, as we’ve said in the past, attackers look for the weakest penetration…

Read More

IoT – Part II, Where Are You? How Are You?

By Cybersecurity No Comments

In my previous post on IoT, I wrote about how networks of Internet-connected devices aimed at making our lives better are the next monster wave of technology being created. I made it a point to say that the future is here but added that there was a cautionary element to the message. As we have noted time and time again, there is a constant battle between convenience and security. As more products are made and marketed to consumers and businesses with the angle that they will make your life easier, better, simpler, faster or [insert positive adjective here], the value that these devices offer…

Read More

IoT – Part I, An Overview

By Cybersecurity One Comment

In five to ten years we’ll be reminiscing about what it was like to have to remember to pick up a gallon of milk at the store. Why? Picture this… You get in your car to drive home from work and your car alerts you that you should take a different route than usual. You see, you should go to the supermarket slightly out of your way because they have your preferred brand of almond milk on sale and your refrigerator detected that your current supply wasn’t enough to make the dish your spouse looked up on her phone just…

Read More