Cyber Security

659

Solutions

958

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

Speaking of voice scamming, here's a rather catchy warning about cyber security, courtesy of Emerates Bank: https://vimeo.com/344959412
1
Become a Microsoft Certified Solutions Expert
LVL 19
Become a Microsoft Certified Solutions Expert

This course teaches how to install and configure Windows Server 2012 R2.  It is the first step on your path to becoming a Microsoft Certified Solutions Expert (MCSE).

Apparently United Rentals email was hacked, as opposed to someone spoofing email from their domain. They are a large company, so heads up if you have business dealings with them.

Cybersecurity Bulletin

United Rentals
(Aug 22, 2019)
 
The email system for United Rentals was hacked Aug 21, and several of our employees have reported getting the email. The attack was real with the intent to access our systems by having users click on the links.  
 
Key Red Flags:
-      External Email
-      Invoice number missing in email body
-      Misleading links (use of wvw instead of www at the front of the links)
-      Links with several characters and numbers
-      Request for payment
-      No formal title for employee sending email (only shows Sales)
 
0
0
https://www.nytimes.com/2019/05/06/us/politics/china-hacking-cyber.html
Chinese intelligence agents acquired National Security Agency hacking tools and repurposed them in 2016 to attack American allies and private companies in Europe and Asia, a leading cybersecurity firm has discovered. The episode is the latest evidence that the United States has lost control of key parts of its cybersecurity arsenal.
Morning NSA and thank you so much!
1
2

[Newsflash] Get a highly available system for cyber protection    

SDI3.pngThe hyper-converged infrastructure market is on pace to grow from $4.1 billion to $17.1 billion by 2023 and demand for cyber protection solutions is a big reason why. Managed service providers have the opportunity to claim their share of the market by delivering cost-effective, efficient and secure cyber protection solutions – but it requires the right tools.

The new Acronis SDI Appliance ensures that IT pros can access a highly available system, which combines universal storage and high-performance virtualization.

Using just one efficient and secure solution, you can guarantee data safety and authenticity by delivering cyber protection services that meet today’s IT demands:

- Simplify cyber protection tasks
- Ensure high availability and resiliency
- Access reliable, affordable hybrid-cloud data protection
- Get integrated support for virtualization and beyond
- Achieve superior performance

Meet the Acronis SDI Appliance


The Acronis SDI Appliance is a new plug-n-play solution with pre-configured Acronis Software-Defined …
0
Just received a phishing sms text message attempting to look like an Amazon delivery alert. Very clever. Stay safe out there!
amazon phishing sms message
3
Fake call centres raided. About time. Probably won't stop them but at least slows them down.
https://nakedsecurity.sophos.com/2018/12/03/microsoft-cracks-down-on-tech-support-scams-16-call-centers-raided
1
15_years_.jpg Acronis Celebrates 15 Years of Cyber Protection!
Explore Acronis' History https://15.acronis.com 
0
Zero Downtime How to prioritize workloads during total downtime? Consider:
- The order in which workloads should be brought up
- Which workloads should have redundancy and failover
- Which workloads can wait or should be stopped to free resource capacity
https://bit.ly/2yb7Wqh
0
CompTIA Network+
LVL 19
CompTIA Network+

Prepare for the CompTIA Network+ exam by learning how to troubleshoot, configure, and manage both wired and wireless networks.

Keep your business safe from Ransomware Two ransomware attacks to international ports happened recently, at San Diego and Barcelona. Our experts recommend four simple steps to ensure your files, apps, and systems stay safe https://bit.ly/2Nl5UZn
0
Ransomware is the next big security threat. Don’t be a victim. Prepare your business for fast and easy backup now https://bit.ly/2O0FO34 
1
Bankrupt Company's Data Resold on Craigslist

Heads up for any members who have ever purchased through NCIX. Looks like their server equipment was sold off without being scrubbed.
This is a good reminder about letting a third party store your credit card data.
https://nakedsecurity.sophos.com/2018/09/24/bankrupt-ncix-customer-data-resold-on-craigslist/
2
LVL 53

Expert Comment

by:noci
They can sell the data to any company that continues the business (as a whole)  in one part.  (restart of business with new owners)...
(that is data that will still be used for what it was provided for.... ) Data is NOT provided for anything else then conducting business with THIS company.   (If EU customers are part of the data GDPR is important here, or even if non-EU citizens did business from the EU).
So there is no license on the data for a lot of different things.
0
LVL 53

Expert Comment

by:noci
The new  owner of the data ALSO inherrits this license/restriction on the data is not that  the data is free for all after it has been flogged off... (In legal theory...,  i am afraid it will be a free for all in practice).
0
In 2017, the number of vulnerabilities detected in applications rose 33%. Is your company prepared to deal with these risks? Train to become a Certified Penetration Testing Engineer today! There are only two days left to enroll in this month’s Course of the Month.
2

[Free Webinar] Ten Security Controls for effective Cybersecurity


cyber-webinar-1200x627.jpgWith cyberattacks evolving everyday organizations are forced to build a strong security layer to keep their data safe and maintain user privacy. With so much touch points to improve organization security, ManageEngine is here to facilitate things for you, by hand picking 10 primary security controls which you need to practice to keep the attackers at bay.

Attend our webinar about cybersecurity on April 24th, 11 am BST and make sure you have the best security measures in place for 2018.

Register Now: https://goo.gl/R16u4f
0
Did you know it only takes 2 hours for a security patch to be reversed engineered? Don’t let your company’s vulnerabilities go unsupervised. Enroll in March’s Course of the Month to begin training for your Certified Penetration Testing Engineer Certification today.
1
PMI ACP® Project Management
LVL 19
PMI ACP® Project Management

Prepare for the PMI Agile Certified Practitioner (PMI-ACP)® exam, which formally recognizes your knowledge of agile principles and your skill with agile techniques.

Obtain real-world security knowledge that allows you to recognize vulnerabilities, exploit system weaknesses, and safeguard threats. Enroll in March's Course of the Month to ensure you attain a higher level of cyber security.
0
2
Be on the lookout for exciting changes coming to our course offering! With an additional 1500+ courses ranging in topics from cybersecurity and IT management to business practices and HR, there will be something for everyone. What courses would you like to see?
6
LVL 5

Author Comment

by:Randal Redberg
Hi Andrew,

I fully agree. We look forward to working with you and other long term memebers of the site to help us fill in the voids and provide valuable resources to the member base.

Thank you for your input.

Randy
0

Expert Comment

by:Jack Senesap
anything with cyber security is good with me.
0
Learn how to mitigate the new intel bugs Meltdown & Spectre,

Join this free #webinar titled "How to mitigate #Meltdown and #Spectre bugs" on Jan 10, 11:00 am EDT to get hands on experience, clarify your doubts , fix the exploit and get back to your routines.

https://www.manageengine.com/products/desktop-central/meltdown-and-spectre-webinar.html?ee

melt-webinar-social-banner.jpg
0

TeamViewer hacked: Here’s how to protect your systems


Hi there,

TeamViewer can be exploited using a vulnerability allowing users to switch between viewer and presenter side, or remotely control the server. If you are using TeamViewer in your enterprise, do act now.

Read more: https://goo.gl/2E65yX
1
5 tips for seamless endpoint security

Hey there,

Are you worried about your endpoints being hacked or breached?

Here is a simple tips to build the best endpoint security in your enterprise.

Building an effective endpoint security has become all time priority for enterprises. With the amount of cyber attacks evolving day by day, enterprises have to practice certain simple best practices tosimple tips to build the best endpoint security keep them vigilant against any unforeseen vulnerability breaches.

Read more: https://goo.gl/taAmSB
0

Cyber Security

659

Solutions

958

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.