Archives: January, 2022

Doug Bedell — January 31, 2022, 5:00 pm

• Fraud Alert: Social Media A Scammers’ Hangout

Watch out for fraudsters lurking on social media websites. Today in Security advises that fraud is “going viral on social media”. “According to the U.S. Federal Trade Commission (FTC), social media was more profitable for scammers in 2021 compared to any other method of reaching victims. Of all people in the United States who reported […]

Doug Bedell — January 28, 2022, 3:17 pm

• Something to Consider: Security Guards Working in Winter’s Cold

The Guardian Booth website makes the case for providing outdoor booths for security guards working in cold winter weather. “Working outside in freezing temperatures comes with its fair share of health risks that must be responsibly managed. “If you need to work outdoors during this challenging season or manage employees who work outside, you’ll want […]

Doug Bedell — January 26, 2022, 1:26 pm

• Enabling CyberSecurity Awareness at Workplaces

The SecurityAdvisor blog advises on how “Human Behavior Creates a Cyberculture,” hopefully a safe one. Note the methods used by computer intruders to endanger workplaces and how to counter them. “Businesses frequently skip over the fundamentals. This causes a lot of uncertainty among personnel, leading to security breaches that could have been easily prevented. For […]

Doug Bedell — January 24, 2022, 12:14 pm

• Learning from the Jan. 6 Capitol Security Failings

Using “20/20 hindsight”, Brian Gant on SecurityInfowatch.com reflects on whether the attack on the capitol have been prevented. I think so,” he concludes. “If it had been treated as a true national security event should, I do think it would have been prevented. While hindsight is always 20/20, here are a couple of things that […]

Doug Bedell — January 20, 2022, 2:31 pm

• Digital Security Needs to be Collaborative

When airlines start canceling flights because of concerns over interference from new 5G telephone towers/antennas near airports, something has gone awry with collaborative communication, or the lack of it. “The attempt to roll out amped up mobile service across the United States has been a bit of a mess,” CNN Business reports. The aviation industry […]

Doug Bedell — January 17, 2022, 3:34 pm

• Security Systems Becoming Ever More Refined

Oh, wow! We’ve been here before, but SecurityInfowatch is providing more insight into how enterprise security is becoming a more technologically aggressive challenge. “Security end-user demanding systems that are faster and more intelligent, and at the same time cost-efficient and better suited for integrated solutions, are looking for more than technology that detects and deters. […]

Doug Bedell — January 13, 2022, 12:23 pm

ª What a Cyber Attack in a Prison Can be Like

Charlie Osborne on ZDNet writes about what a cyber attack in a prison can be like. “Inmates (in a New Mexico prison) were made to stay in their cells as the ransomware outbreak reportedly not only knocked out the establishment’s internet but also locked staff out of data management servers and security camera networks. “The […]

Doug Bedell — January 11, 2022, 10:20 am

• Parking Meters Could Have Bogus Codes Stuck to Them

Graham Cluley advises don’t be in a hurry to use parking meters – they could have bogus QR codes stuck to them. “In a hurry to park your car?,” Cluley writes, “Don’t want to fumble around in your pocket to find cash for the parking meter, and don’t have the correct payment app installed on […]

Doug Bedell — January 6, 2022, 12:23 pm

• Risks of Cyberattacks Are Growing – Heed Them

Danny Palmer on ZDNet advises that “the threat of cyberattacs is growing and much more needs to be done to educate busineses and users about risks in order to prevent widespread damage and disruption as a result of cyber incidents. “Events like ransomware attacks against utilities and infrastructure providers, production facilities and hospitals have demonstrated […]

Doug Bedell — January 3, 2022, 11:18 am

• Examples of Insider Security Threats

Examples of insider cybersecurity threats – organizations hampered by their own people – are displayed by the Digital Guardian site. “Insider threats,” the post explains, “are generally more dangerous than outsider threats because these people know the organization pretty well. Plus, they have access to the computers, databases, networks, and other company resources where sensitive […]