Posts filed under:Information Security

WhatsApp and it’s backdoor peering into you

Updated 14 January 2017 ———————– Today the Guardian reported that the Facebook owned application, WhatsApp contains a backdoor into its cryptographic end-to-end protocol. What this means, if true, is that your private conversations, may be encrypted as they pass through […]

By: | Safety & Security, News, Online Safety, Information Security| Tags: | Comments: Comments Off on WhatsApp and it’s backdoor peering into you

GOP link to North Korea – Hack Sony Pictures Entertainment?

The Chinese hacking group, Guardians of Peace (GOP) are believed to have links to North Korea according to press reports from the region describing a technology hack of Sony Pictures Entertainment. At first blush one must ask, ‘why North Korea.”  […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on GOP link to North Korea – Hack Sony Pictures Entertainment?

Bringing the Social Media #Revolution to Health Care (Mayo Clinic)

On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities […]

Encrypt or not to encrypt, that is the question

17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of […]

Medical Device Security – Are your devices secure?

Many medical devices have telemetry requirements, which require patient data to be both present within the device’s resident memory and to be transmitted from the device to a monitoring or record-preservation device (hard drive or tape). During transmission, are the content or command/control sequences protected? Do they need to be? Unfortunately, yes. The data must be protected not only from a PHI-data disclosure perspective, but also from data corruption perspective.

Do You Know Where Your Data Is?

The following appeared in the Canadian online magazine Security Matters:  Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess  Everywhere you look, retailers and other entities are offering to […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Do You Know Where Your Data Is?

Social Media and Cyber Security (Talk2Cisco)

In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security.  Here is the write-up and recap of the event: Talk2Cisco .  I took a moment and watched the video, and […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Social Media and Cyber Security (Talk2Cisco)

Are You a Demanding User?

By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Are You a Demanding User?

Out of Control User = Frenetic IT

By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Out of Control User = Frenetic IT

Online Safety: Bringing us Back to the Basics of Online Safety and Security

Today I share with you a piece I wrote in the beginning of November as a guest blog for Cammie Moises and her MomsMaterial blog.  The content I believe is apropos for your families and friends who may be online.  […]

  • Security Monitoring

Security Monitoring – a book review by Christopher

The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.

By: | Reviews, News, Information Security| Tags: | Comments: Comments Off on Security Monitoring – a book review by Christopher