The Art of Deception: Stories of How We All Get Phished

Are you like most people who associate cyber, cyber security, data breaches and other similar terms with computers and technology? When you hear about a data breach in the news, do you immediately wonder which technical vulnerability was exploited? This is probably the reason why so many companies believe that a breach won’t happen to their company. They believe hackers only exploit technical vulnerabilities and somehow their tools and techniques for securing data are better than everyone else’s. Regardless of the reason, most are ignoring the one weak link in the chain that is more easily exploited than most technical vulnerabilities but much more difficult to mitigate — the end-user. The employee with access to the network is by far a much greater threat than just about any technical vulnerability. One click and your network is compromised.

Read more

Common Project Manager Mistakes: #4 Murphy vs. Parkinson

We all know Murphy’s Law: Anything that can go wrong will go wrong. It’s thanks to our deep and abiding faith in Murphy’s Law that many of us, and most of the folks on our teams, always add a bit of “padding” to our estimates. We’ve got to allow for Murphy’s impact. Though we joke a lot about Murphy’s Law, we have learned through consistent and often difficult experiences that something will not go as planned so we had better build in some safety to give us a chance to deal with the problems.

Read more

A Look Back at 2014 Security Breaches

This year has been a rocky year for computer security. There have been many large personal data breaches, including those of Sony, eBay, Michaels, Spec’s, Home Depot, Staples, Kmart, Dairy Queen, MBIA Inc., Jimmy John’s, Goodwill, P.F. Chang’s, California Department of Motor Vehicles, Sally Beauty Supply, and others. Many of these breaches took place over […]

Read more