Skip to main content

Posts

Showing posts with the label security

Yes, There Are Competent IT and Cyberprofessionals Out There, If You're Not Cheap.

The updated (and frankly, better written and edited) version will be on my Medium blog December 7th, 2020 with the title " The Myth of the Tech Talent Shortage and The Cost To Your Business ." My Medium profile is here . This post is getting attention again: Hi. I like to think I've gotten less angry than when this was posted (Though I still think it's true, the times have changed with COVID-19, and I could have worded this more constructively). I'm pivoting to different areas of IT; Check the services and projects tag.   It's still BS that there aren't more part time positions in IT and tech. It's not like the talent isn't plentiful.  From Pexels.com Atlanta, Georgia Baltimore, Maryland Newark, New Jersey Savannah, Georgia What do they have in common? They have been the victim of serious cyberattacks on their infrastructure. Said attacks cost the affected city governments and companies more than 30$million dollars . ...

Your Traffic Has Been Captured and Data Stolen; Sucks Huh?

https://hackernoon.com/a-hacker-intercepted-your-wifi-traffic-stole-your-contacts-passwords-financial-data-heres-how-4fc0df9ff152 Very interesting article in parts about MITM attacks, unencrypted traffic, and the general gullibility of the modern person. ("Free WiFi Here" - No identification as to what company, just a splash page and user agreement checkbox).

#LearnedIT: IT Security Foundations - Protecting Our Server

Hi again, same course, different submenu. Let's play a game -  Based Upon the Menu, How Much Do I Remember? I did take Sever 2008/12 during my time in college and found it one of the more fun aspects! Hardening the Server - Put it behind a correctly-configured firewall if it's facing the internet. Correctly configured means the proper rules are established regarding access (think 'allow tcp any any') , and ports on the server should be closed if they're not being used unless, again, it's properly configured. Use ACLs to allow one computer located in an area you know is safe and has limited web access to configure the server.  Run auditing, and don't give any one person more permissions than they need. Principal of least privilege!  Train your users. Lisa Bock, our author,  doesn't get as deep as I do, but helpfully reminds us that the physical server should be in a secure, monitored environment to ward off intruders and also overly cool or ho...

Book: Click Here to Kill Everybody by Bruce Schenier

"There is a fundamental difference between crashing your computer and losing your spreadsheet data, and crashing your pacemaker and losing your life,"  Blog Post If you follow me across the web, you know I deeply distrust the Internet of Things. In making things easier for the non-techie, having simple or non existent security options makes them - and everyone else - more at risk for cybercrime. I finished my Security+ book and read  Click Here to Kill Everybody .

#LearnedIT: IT Security Foundations: Protecting Our Email

Specifically, the Understanding Email Protection submenu. Here is the link to the course in full. Kubernetes and Ubuntu stuff is still happening, but I keep you on your toes here. Did you expect that? A lot of this is review so I'll note the parts we should know.