Author Archives: sistech

About sistech

I have been involved in technology for over 25 years to include Network design, deployment, and configuration of various logging and reporting techniques for these systems into a Secure Managed Environment, Systems Administration and the delivery of technology services to assist customers in their business processes. I have been heavily involved in Cyber for the past ten years and currently hold a CISSP and SANS – GSEC certifications.

Value of Annual Risk Assessment Reports and a Proper POAM

A short BIO to introduce myself, I have been involved in technology for over 25 years to include network design, deployment, and configuration of various logging and reporting techniques for these systems into a Secure Managed Environment, Systems Administration and … Continue reading

Posted in Opinion | Leave a comment

Smart TVs Vulnerable to Hacking, Consumer Reports Finds

This is a very interesting article and one indication of what is developing within the ” Smarthome Network”. As we integrate more technology into our homes and lives it becomes increasingly apparent that we are no longer autonomous as we … Continue reading

Posted in Home Network Security | Leave a comment

Why Manufacturers Should Be Mindful Of Cybersecurity

Hackers can penetrate the corporate IT network of a manufacturing company, then gain access to a robot’s controller software and, by exploiting a vulnerability remotely, download a tampered configuration file. As a result, instead of a straight line, the robotic … Continue reading

Posted in Cyber Intrusions in the News | Leave a comment

Wannacry

This article was interesting to me post from wired.com, so I decided to repost. On May 12 a strain of ransomware called WannaCry spread around the world, walloping hundreds of thousands of targets, including public utilities and large corporations. Notably, … Continue reading

Posted in Uncategorized | Leave a comment

How Hackers Manipulate And Compromise Business Email

Business email compromise is an attack that targets customers or employees that work with your external-facing business associates. Here’s an overview of how it might work: Customer A (we will call them Able for this scenario) falls for a phishing … Continue reading

Posted in Uncategorized | Leave a comment

HOW NOT TO BE A RANSOMWARE VICTIM

Regularly backup your data, and make sure the backups are not connected to the computers and networks they are backing up. Most ransomware variants can encrypt files on any attached drives or network files that are also accessible to the … Continue reading

Posted in Cyber Security Defense | Leave a comment

DOD Announces Digital Vulnerability Disclosure Policy and “Hack the Army” Kick-Off Press Operations Release No: NR-413-16 Nov. 21, 2016

Building on the success of the “Hack the Pentagon” bug bounty pilot in which hackers from across the country were provided legal authorization to spot vulnerabilities in specific Department of Defense networks in return for cash payments, the Department of … Continue reading

Posted in Uncategorized | Leave a comment

Service Providers: a Weak Link in an Organization’s Cyber Security Program? – CyberArk

Vendor-related IT security is a well-documented concern within the cyber security industry. In exploring the main cyber security challenges with third-party vendors, a recent Mandiant report highlights several issues associated with attacks stemming from IT outsourcing (ITO). According to the … Continue reading

Posted in Cyber Intrusions in the News | Leave a comment

Home Network Security a Wise Choice

We all lock our doors at night; some even purchase or build homes in gated communities so why do we install high speed internet connections into our homes and never give any thought to the security of those home networks. … Continue reading

Posted in Home Network Security | Leave a comment

Best Practices for Home Network Security – SandBoxing

Surfing compromised or malicious web sites is a common way to infect your PC with malware. Consider using one of several available web browsers (e.g. ChromeTM[4], Safari®[5]) that provide a sandboxing capability. Sandboxing creates a bubble or virtual environment that … Continue reading

Posted in Home Network Security | Leave a comment