I’m pleased to announce our first-of-its-kind Healthcare Data Breach Intelligence Report. This value-packed free report is a must read for anyone in the healthcare space. We detail the top healthcare threats, most critical security controls (as cited by HHS OCR), the largest healthcare data breaches of 2019, a state-by-state comparison of reported breaches, and provide a data breach prevention blueprint. …
My Favorite IoT Hacks – Webinar
“My Favorite IoT Hacks” is now available on webinar replay. IoT will soon outpace non-IoT devices. Your cybersecurity program needs to account for widespread, insecure, and sometimes unexpected IoT devices. In this talk, Geoff Wilson, CEO of Go Security Pro, will detail IoT hacks and why these devices are such attractive targets. Geoff will also introduce practical strategies for protecting …
BlueKeep Courtesy Scan
At Go Security Pro, we are offering a courtesy BlueKeep scan to check if your network is exposing RDP services that could be exploited. The BlueKeep vulnerability (CVE-2019-0708) is a remotely exploitable flaw in the Remote Desktop Protocol (RDP) Services on older versions of Windows. In our Apply the BlueKeep Patch Now blog post, I detailed the systems it affects, …
When Strict Password Policies Backfire
Passwords that are changed more frequently are more secure, right? Not necessarily. I was working with an organization that takes security seriously. Defense in depth and least privilege permeate their environment. Users do not have administrator privileges and are not allowed to remotely login to systems. Network segmentation keeps a compromised workstation from reaching the administrator interfaces on servers. Only …
Apply the BlueKeep Patch Now
I’m writing to let you know about a critical Windows security patch that should be deployed to affected systems ASAP. The BlueKeep vulnerability (CVE-2019-0708) is a remotely exploitable flaw in the Remote Desktop Protocol (RDP) Services on older versions of Windows including: Windows Server 2008 R2 Windows 7 Windows Server 2008 Windows Vista Windows Server 2003 Windows XP Both Microsoft …
Game of Thrones’ Great War and Cybersecurity
Did you catch the epic Game of Thrones episode “The Long Night” last night? If not, be warned…SPOILERS AHEAD I couldn’t help watching this episode and thinking how it is an analogy for protecting one’s most critical assets in the digital age. These are the cybersecurity concepts came to mind as I was watching the episode. Defense in Depth Armies …
The Single Best Risk Assessment Interview Question
There is one question that I ask in every risk assessment interview that time and time again has yielded the best results. It is a question that goes to the heart of understanding how the business works, not just how the IT department operates. It is a question that IT and Security Pros get to use on a regular basis …
- Page 2 of 2
- 1
- 2