July 8, 2019

Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack.  This guide was a joint effort of multiple Federal agencies to address the growing concern of ransomware. In, “How to protect your Networks from Ransomware,” they pro...

July 2, 2019

Government Imposter Scams

We have all received calls or emails purporting to be from some government agency like the social security administration, IRS, FBI, Medicare demanding immediate attention and often requiring a payment. These scams use threat of government to s...

May 17, 2019

Cybersecurity Supporting Documentation

In previous posts I outlined the required topics for cybersecurity policies and procedures.  In this post I will cover the cybersecurity related supporting documents.

The table below lists items or topics, that should be address eit...

May 10, 2019

In a previous post I outlined the required topics for cybersecurity policies.  In this post I will cover the required procedures from various cybersecurity standards and in a future post will cover the cybersecurity related supporting documents.

The table below lists it...

April 29, 2019

Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco Router Sextortion Scam.  This one seems to have better grammar then past ones.  The details don’t make any sense. The only thing in the...

April 8, 2019

ACH Scam

Vendor ACH request fraud is on the rise.  The scam works this way, cybercriminals stalk their prey (research or intelligence gathering) looking for a new contract award for a vendor or find an existing vendor typically for a local government.  Information lik...

April 2, 2019

Question from a friend. 

“I have a computer with a 10-year-old processor running Windows 7. I need better performance from my computer. What should I do?”

Computers are not single task machines and pinning down the best system for the desired performance has several fact...

March 20, 2019

What topics need to be covered in cybersecurity policies?

In this post I will cover the required cybersecurity policies from various cybersecurity standards and in future posts I will cover cybersecurity procedures and cybersecurity related supporting documents.  The ta...

February 26, 2019

Email scammers have been around since the early ages of the internet. Every year new types of scams flood your inbox, asking for money or account information. These are a few of the scam emails that have already become common this year. 

Emails that start with a low ris...

Tax season is upon us and filing a tax return to get refund into the bank can cause anxiety and excitement at the same time. However, if you e-filed a tax return, only to be rejected by the IRS because your return with your SSN was already accepted, you may be a victim...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare