Posts filed under: Information Security

Information Security

Information Security themed items for use by individuals, families or businesses.

My credit card and the Washington Secretary of State site used in credit card fraud

It was 0730 in the morning and my wife, Kathy, calls down from her office and asks what the $200 charge was on her credit card to the Washington Secretary of State. She had seen the charge come through on... Read More

WhatsApp and it’s backdoor peering into you

Updated 14 January 2017 ----------------------- Today the Guardian reported that the Facebook owned application, WhatsApp contains a backdoor into its cryptographic end-to-end protocol. What this means, if true, is that your private conversations, may be encrypted as they pass through... Read More

GOP link to North Korea – Hack Sony Pictures Entertainment?

The Chinese hacking group, Guardians of Peace (GOP) are believed to have links to North Korea according to press reports from the region describing a technology hack of Sony Pictures Entertainment. At first blush one must ask, ‘why North Korea.” ... Read More

Bringing the Social Media #Revolution to Health Care (Mayo Clinic)

On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities... Read More

Encrypt or not to encrypt, that is the question

17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of... Read More

Medical Device Security – Are your devices secure?

Many medical devices have telemetry requirements, which require patient data to be both present within the device’s resident memory and to be transmitted from the device to a monitoring or record-preservation device (hard drive or tape). During transmission, are... Read More

Do You Know Where Your Data Is?

The following appeared in the Canadian online magazine Security Matters:  Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess  Everywhere you look, retailers and other entities are offering to... Read More

Social Media and Cyber Security (Talk2Cisco)

In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security.  Here is the write-up and recap of the event: Talk2Cisco .  I took a moment and watched the video, and... Read More

Are You a Demanding User?

By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together... Read More

Out of Control User = Frenetic IT

By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing... Read More

Online Safety: Bringing us Back to the Basics of Online Safety and Security

Today I share with you a piece I wrote in the beginning of November as a guest blog for Cammie Moises and her MomsMaterial blog.  The content I believe is apropos for your families and friends who may be online. ... Read More

Security Monitoring – a book review by Christopher

The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues - such as "tuning" so the incident logs tell you the story, and don't... Read More