The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google Chrome. Most assume that Chrome extensions are nothing more than a combination of JavaScript and HTML files that run for our convenience.

Read more

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the inability to carry out security updates.

Read more

Threatlocker Enables the Essential Eight

ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought it was worth the effort to provide a quick breakdown of how ThreatLocker can enable this critical strategy for Australian Businesses.

Read more

Anti-Vaxxing and Cyber Security

I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.

Read more

A Simple Remedy for the Ransomware Epidemic.

Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.

Read more

Control Access – Don’t Block Storage Devices

Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]

Read more

Endpoint Security Needs to Change

Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy.

Read more

Less Hackable – For Small Business Owners

After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: “How can I make myself unhackable?” Seldom do they understand when I try to explain that there is no such thing as unhackable. The purpose of this guide is to help business owners better understand cyber risks and […]

Read more