by Greg Scott | Jul 11, 2015 | Cybersecurity
It seems the Chinese plundered the United States Office of Personnel Management (OPM) at will for at least a year. Here is my original blog post about the OPM data breach nightmare. If you’re a CEO of a major organization and you still think Internet security...
by Greg Scott | Jul 2, 2015 | Cybersecurity
Here is yet another data breach headline, this time from the Donald himself, Trump Hotel properties, published yesterday (July 1, 2015) by Brian Krebs. Here is the link to the article. It seems the banks uncovered a trail of credit card fraud leading...
by Greg Scott | Jun 6, 2015 | Cybersecurity
Yet another sensational data breach headline – not even shocking anymore. Yawn. But listening to the story on the radio on the way home last night after being slaughtered in softball again, I started thinking. And I dug a little deeper into the story when I...
by Greg Scott | Jun 4, 2015 | Technology
I’ve been in the IT industry my entire adult life, so sometimes I use words and just assume everyone thinks they mean the same thing I think they mean. I was recently challenged with the word, “redundancy.” “What does that even mean?”...
by Greg Scott | May 22, 2015 | Slice of Life
I have a friend, let’s call her Mandy. Mandy is an identity theft victim. Mandy is not her real name because this is a private story and she wants to maintain her privacy. She’s willing to share it, anonymously, because she read “Bullseye...
by Greg Scott | May 13, 2015 | Cybersecurity
I was in a Barnes and Noble bookstore a few days go, pitching my new book, “Bullseye Breach,” to one of the folks working behind the counter. I know all the big decisions are always made at corporate headquarters, but nobody invited me to...
by Greg Scott | Apr 21, 2015 | Cybersecurity
The short answer is, no. The pro argument says law enforcement needs this tool to fight crime and terrorism, and we can build appropriate safeguards into any law to prevent abuse. The con arguments point out the danger in granting more power to the government,...
by Greg Scott | Dec 26, 2014 | Slice of Life
[Originally posted December 26, 2014 on my Infrasupport website, right here. I copied it here on June 21, 2017 and backdated to match the original post.] I just finished my own disaster recovery operation. There are still a few loose ends but the major work is done....
by Greg Scott | Dec 10, 2014 | Cybersecurity
By now, we’ve all read and digested the news about the December 2013 Target breach. In the largest breach in history at that time and the first of many sensational headlines to come, somebody stole 40 million credit card numbers from Target POS (point of sale)...
by Greg Scott | Jun 7, 2014 | Slice of Life
I’ve taken thousands of telemarketing cold calls over the years. Many are deceptive, most are awful. And a few are good. Here is a common deception. Many calls originate in call centers in India or the Philippines. Callers use IP phones and connect via the...
Recent Comments