Local Hacker and Security Expert Puts Skills to Use for Good

By: Lisa Z. Leighton In today’s digital world, where each person’s online footprint seems to go on forever, hackers are also becoming omnipresent and prolific. Some threaten the safety of bank accounts and databases, others social media accounts or email address lists, but still others called “white hat hackers” are doing good — for local businesses and individuals. A local …

Do You Have An Acceptable Use Policy in Place?

It’s 2018 and organizations of all sizes have to worry about what their employees and contractors are doing with company computer equipment, websites, smartphones, and Internet connections. It’s no longer just a matter of wasted time that should be spent on job duties or the cost of network bandwidth. In the growing jungle of government regulations, civil lawsuits, compliance fines …

Seminar: Managing Your Cybersecurity Risks and Compliance

Michael, Kyle, and I (Art) will be speaking at the CentralPA Chamber on Friday January 12, 2018 at 9am to discuss cybersecurity and compliance.  We will be discussing Internet security, privacy, and the issues that the region faces, and what to do about it.     Register for the event: New Years Resolution: Managing Your Cybersecurity Risks and Compliance

Internal Penetration Testing & Small Business

Internal Penetration Testing You may be thinking, “What even is an internal penetration test?”, there is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal penetration testing is the act of mimicking a hacker to break into your systems and find vulnerabilities in your business’s internal network. In …

Small Business Security and IOT

What is the Internet of Things? The cars on the street zooming by, the cellphone in your pocket, the farmers irrigation system, and the factory in town. What do all these “things” have in common? They are connect to the Internet to create the almost inexhaustible expansion commonly known as the Internet of Things(IOT). While connected to the Internet, these …

Firefox is Insecure? Not So Fast.

So there is a story today about Firefox being deemed too insecure to be part of the Pwn2Own competition. Now I run Firefox and kinda prickle at the notion that I am doing something insecure. So let’s try to get to the truth of this matter. Claim: All of the browsers for which prize money is available have made significant …

Smartphone GeoTagging Security Warning

This post is extremely important! Please read and share it with your friends and family! Smartphones are becoming more and more popular with time. Whether it be an iPhone, a Droid or a Blackberry, they are all capable of giving away your location, posing a major security risk! How do they do this? Smartphones with GPS and a camera come …

Hallmark Postcard Virus

This is a new virus that was discovered yesterday 12/7/2010.  This is not your standard run of the mill virus that has been going around.  What it does is infects and wipes the “0” (zero) sector of the hard drive rendering your machine unbootable. So please if you receive any email with “hallmark postcard” attached to it delete the email …

Safe Web Surfing Checklist

Here is a quick checklist for safe surfing on the Internet. General Assumptions: 1. You have anti-virus (use AVG Free) 2. Windows Firewall is on 3. You have a router and are not directly plugged into your cable modem or DSL modem. If not, get a router/firewall. 4. You have all the latest updates from Windows. If not, please do …