|

Creating a Cyber-Secure Environment at Home

Most workplaces have cyber security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies. Policies At home, determine: A central location for your computer so you can monitor your children’s activities online. Whether you allow access to certain sites. You may choose to use parental control settings…

| |

Phishing Alerts — Fake Traffic Tickets & False Credit Union Messages

From the Desk of Chad M. Barr, CISSP, CISA, PCI QSA There have been a number of recent “phishing” campaigns, which are attempts by individuals or groups to solicit personal information from unsuspecting users by employing social engineering techniques. This month’s newsletter will focus on some of recent campaigns and provide guidance for protecting yourself…

|

Increase in Java Exploits

From the Desk of Chad M. Barr, CISSP, CISA Java is a programming and computing platform widely used for stand-alone and web-based applications/applets, including utilities, games, and business applications. The platform was first released by Sun Microsystems in 1995. Many applications and websites require end-users to have Java installed, and the software is used extensively…

|

Erasing Information and Disposal of Media

From the Desk of Chad M. Barr How can I be sure files are erased? Data can be stored electronically in multiple formats and locations. Data sometimes includes sensitive documents or possibly data containing personally identifiable information such as a social security number, credit card information, or health related information. For example, the initial information…

|

Why Cyber Security is Important

From the Desk of Chad M. Barr, CISSP, CISA What is cyber security? It seems that everything relies on computers and the Internet now — communication (email, cell phones), entertainment (digital cable, MP3’s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much…