//accordian//

Cyber Safety and Tips

Backups: The Cure to Viral Cyber Infections

Given the steady uptick in ransomware across the country, and right here in our State, we simply cannot overstate the importance of maintaining good backups that are stored offline (physically off of the network) and regularly tested to ensure you can fully recover in the event of a data loss incident. But what, specifically, does that mean to you and how do you go about implementing a sound data backup and recovery strategy?

Website Defacements – How to Protect Your Website

Imagine you wake up one day to find that your company’s website no longer displays your logo, products, or contact information. Instead of providing an online presence for your business, your website is now promoting a hacking group or terrorist organization. Your customers are angry and your employees are confused. 

An Intro to Using Hashes to Check File Integrity

An Intro to Using Hashes to Check File Integrity

Disclaimer: If technical jargon makes you queasy, proceed with caution!

When downloading new software or updating existing software, how do you ensure that what you are installing is safe, unaltered, and from a reputable source? The simple answer is to compare the checksum of the file you downloaded to the hash of the original source file.

2015 Data Breach Lessons Learned

2015 Data Breach Lessons Learned

If the past two years have taught us anything, it’s that the frequency and impact of data breaches will continue to grow if organizations do not do more to implement effective cybersecurity practices. The theft and sale of personal data is big business for profit-motivated hackers, while state and non-state actors clamor to get their hands on sensitive and potentially damaging information for various intents and purposes, from extortion to espionage.

Keeping Your Children Safe Online

This weekend, if you’re a parent, you’re probably going to spend some time reminding your children to be careful when they head out the door to go trick-or-treating. You might tell them to walk in a group and not wander off, and to stay in safe, familiar, well-lit neighborhoods. You’ll remind them to look both ways before crossing the street and to not venture into strangers’ houses, no matter how friendly they seem.

Bots and Botnets: There Are Zombies Among Us

Bots and Botnets: There Are Zombies Among Us

October is one of my favorite months of the year – the air is crisp, the leaves are beginning to change, pumpkins are everywhere, and Halloween is right around the corner. It’s also National Cyber Security Awareness Month and, as a way to pay tribute to this wonderful time of year, I’m dedicating this NJCCIC CyberLog to the topic of zombies. 

Cyber Extortion – A Troubling Trend

Cyber Extortion – A Troubling Trend

There are several reasons why individuals may choose to become hackers. Some people might do it out of curiosity or for personal gratification. Others do it for financial gain or to steal intellectual property. Some consider themselves “hacktivists,” a relatively new term used to describe those who hack to promote a personal or ideological agenda. 

Public Wi-Fi – Sacrificing Security for Convenience

Public Wi-Fi – Sacrificing Security for Convenience

In my previous CyberLog post, I shared some of the information I learned while attending DefCon 23, an annual hacker conference held in Las Vegas. What I didn’t mention, though, were the things I had to take into consideration prior to my arrival. As this was my first time attending, I wasn’t sure what to expect so I did some research and talked to a few former DefCon attendees.