Top 3 Grooming Techniques in Fraud: What to Watch for

Top 3 Grooming Techniques in Fraud: What to Watch for

Grooming is a method of establishing a connection with a person to perpetrate a crime against them. Grooming is becoming more common in fraud, both online as well as in interpersonal interactions. What’s more, scammers are getting more sophisticated in their techniques. There is a mistaken belief that scammers are forceful, arrogant, and therefore easy to spot, but many play a long game, carefully and patiently grooming the victim before asking for money. In some…

Read More

CISO: Investing in Frameworks, Humans, and your Technical Skills

CISO: Investing in Frameworks, Humans, and your Technical Skills

The journey for someone to the role of Chief Information Security Officer (CISO) isn’t often straightforward. Take Sandy Dunn, for example. Per SailPoint, Sandy started as a paper delivery kid at 10 years old. She then worked her way through software sales, insurance, and even horses before becoming the CISO of a health insurance provider in Idaho. All these “entry-level” jobs share one thing in common. They gave Sandy the experience to fulfill a CISO’s…

Read More

Forensic Collections From a Mac: Challenges & Solutions

Forensic Collections From a Mac: Challenges & Solutions

INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS, and Windows file systems). With digital forensic professionals seeing more Mac laptops and other Apple devices more often, we created this guide to identify a few challenges that law enforcement and digital investigators may encounter and provide solutions and best practices for tackling these obstacles both…

Read More

All the ways TikTok tracks you and how to stop it

All the ways TikTok tracks you and how to stop it

In August 2018, Chinese company ByteDance bought video startup Musical.ly and fused it with another app. The result was TikTok, the wildly popular short video app that’s now one of the most downloaded apps in the world. Today, the social network has more than one billion users, double that of Snapchat and Twitter combined, with TikTok stars making up to $5 million a year on the platform. Yet TikTok’s rapid rise has also led to…

Read More

Zero Trust and the Federal Government: Feedback for Progress – Cisco Blogs

Zero Trust and the Federal Government: Feedback for Progress – Cisco Blogs

On May 12, President Biden signed a cybersecurity Executive Order (EO) aimed at improving efforts to “identify, deter, protect against, detect, and respond to these actions and actors”. The order aims to improve federal security practices and threat intelligence sharing amongst federal agencies and the private sector; enhance software supply chain security, and improve federal security incident response. The impact of this order will ultimately extend beyond federal agencies, impacting vendors who directly support the…

Read More

Nebraska Issues First Federal Cyber-stalking Sentence

Nebraska Issues First Federal Cyber-stalking Sentence

The first ever person to be convicted of cyber-stalking in the District of Nebraska has been sentenced to federal prison. Dennis Sryniawski, a 48-year-old resident of Bellevue, was charged with intent to extort and cyber-stalking his former girlfriend, Diane Parris, in an attempt to prevent her husband, Jeff Parris, from being elected to the Nebraska legislature.  A jury convicted Sryniawski on only the cyber-stalking charge in June 2021, after a three-day jury trial. Evidence presented at trial…

Read More

New Cybersecurity World Record Set

New Cybersecurity World Record Set

A new Guinness World Record in cybersecurity training has been set by a cloud-based identity and access management (IAM) provider, a security awareness training platform, and a PR firm.  The first-of-its-kind record was for the most views of a virtual cybersecurity lesson in 24 hours, and it was achieved on October 14 through the joint efforts of OneLogin, KnowBe4, and Eskenzi PR. Security expert and global data protection officer at OneLogin, Niamh Muldoon, and Javvad Malik, lead security…

Read More

Access control, customer service among top security guard responsibilities

Access control, customer service among top security guard responsibilities

Access control, customer service among top security guard responsibilities This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

US Secret Service Announces Cyber Games Winner

US Secret Service Announces Cyber Games Winner

A team of law enforcement officials from South Carolina has seized first place in a nationwide cybersecurity contest. More than 200 teams from across the United States participated in the National Computer Forensics Institute’s (NCFI’s) Training and Cyber Games competition, which took place earlier this month. During the event, teams of NCFI-trained local law enforcement officials joined forces with Secret Service investigators to form integrated response units.  The units were tasked with solving a simulated cyber-attack…

Read More

Protecting SMBs from Current Cybersecurity Threats

Protecting SMBs from Current Cybersecurity Threats

A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If you own a small or medium-sized business, you are a target of the majority of cyber security attacks. It can happen to you, it does happen to your peers, and more than half of all SMBs that suffer a cybersecurity attack never recover. Attacks against SMBs almost never make the news; those stories are reserved for the…

Read More
1 3,414 3,415 3,416 3,417 3,418 4,241