March 9, 2020

In cybersecurity awareness programs, we try to keep people informed of the latest scams.  However, it seems like we are chasing a carrot on a stick.  Scammers are continually changing up their scams, and it is nearly impossible to keep up with the rapid changes.  This...

February 5, 2020

A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers.  It seems business executives do not have confidence that the CISO understands the business.  It seems many executives make business decisions that have c...

July 8, 2019

Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack.  This guide was a joint effort of multiple Federal agencies to address the growing concern of ransomware. In, “How to protect your Networks from Ransomware,” they pro...

May 17, 2019

Cybersecurity Supporting Documentation

In previous posts I outlined the required topics for cybersecurity policies and procedures.  In this post I will cover the cybersecurity related supporting documents.

The table below lists items or topics, that should be address eit...

May 10, 2019

In a previous post I outlined the required topics for cybersecurity policies.  In this post I will cover the required procedures from various cybersecurity standards and in a future post will cover the cybersecurity related supporting documents.

The table below lists it...

April 29, 2019

Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco Router Sextortion Scam.  This one seems to have better grammar then past ones.  The details don’t make any sense. The only thing in the...

April 8, 2019

ACH Scam

Vendor ACH request fraud is on the rise.  The scam works this way, cybercriminals stalk their prey (research or intelligence gathering) looking for a new contract award for a vendor or find an existing vendor typically for a local government.  Information lik...

October 6, 2017

Security Issues

ISMG, "Beware: Apple's Password Manager Has a Zero-Day Flaw, Attackers Can Steal Clear-Text Credentials From the Keychain, Researcher Warns" by Jeremy Kirk, 29 SEP 2017:

April 26, 2017

IT staff often have several projects or issues open at a time.  IT staff needs a way to prioritize their time with competing priorities.  At Maze & Associates we use the following guideline as part of our process.

IT Decision Making and Help-desk Triage Guide

  • Le...

March 17, 2017

Everybody likes getting a new computer.  Especially me.  Here are the specs and pictures of me new rig.  Not so much for gaming but for running Virtual machines and large workloads.

Thinkstation P510
512GB M.2 PCIe SSD
2TB 7200RPM Drive
32GB ECC RDIMM (16x2, u...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

Please reload

Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare