Posts

Showing posts from June, 2023

Avoiding Scams: Check, Double Check, and Check Again

The 10 Most Common Types of Fraud article denotes imposter scams, online shopping scams, and prizes, sweepstakes, and lottery scams as the three most common forms of fraud (O'Shea, 2022). These scams provide quick cash for attackers with little recourse for victims. They require little to no programming experience and are very easy to implement. Imposter scams often involve automated calls where prerecorded machine voices pose as a trusted family member, friend, or reputable company to ask for your credit card information. Unsuspecting victims often fall for these scams because they are exploited by their emotions and care for the supposed recipient who appears to be in distress. Receiving a phone call that requests money should always raise a red flag. Emails that appear to be sent from trusted friends or family can easily be spoofed. Ensuring that the email originated from a friend or family member by calling them directly is the best way to ensure they did, in fact, send the e...

Company Reputation: Ensuring Secure Transparency

The Federal Trade Commission highlights a need to quickly notify affected parties so that they have an opportunity to put a recovery plan in place. Data forensic teams must address vulnerabilities, privileges, and a lack of network segmentation that could lead to additional data loss (Ritchie et al., 2022). In 2014, Ebay’s reputation was severely damaged after a phishing attack exposed multiple employee credentials that led to 145 million users’ data to be breached. Because financial information was not accessed, Ebay did not take the breach seriously and users became hesitant to trust them (Skillsire, 2020). Alternately, Heartland took its data breach in 2009 extremely seriously. While they still suffered financial consequences, added security measures and an effort to educate customers restored their users’ faith and Heartland went on to become a fortune 100 company despite their accidental exposure of 134 million user credit card information after an sql injection attack (Comodo ...

Agile and DevOps: Goes together as well as Peanut Butter and Jelly

  An understanding of how DevOps and Modern Agile fit together encourages the successful delivery of a quality product.  While DevOps and Modern Agile can be organized separately, an organization that implements both viewpoints arguably increases its ability to deliver quality products. Agile focuses on making development teams more efficient. While DevOp undeniably does make development teams more efficient, the focus of DevOps is on how the whole organization interacts. Instead of optimizing how development teams prioritize and complete tickets, DevOps optimizes reducing the amount of time it takes to produce a product by seamlessly integrating different departments in an organization. While DevOps and Agile are different methodologies, they can be seamlessly used together to improve development processes, company culture, product quality, and time-to-market.

IP-enabled devices: Why Not Forgo Encryption and Authentication?

IP-enabled devices provide convenience to users by allowing a device to connect directly to a network. Smart home automation devices may allow a user to use their device to turn on the lights, ring a doorbell, control their thermostat, or monitor their home via security cameras. Lateral movement attacks allow a dangerous hacker to exploit vulnerabilities in insecure smart home automation devices and allow them to move laterally within your network. While Encryption and Authentication may prevent a quick, convenient setup, every insecure device that sits on a network significantly increases the risk that a hacker will gain access to sensitive data and private servers. IP-enabled devices operate over simple ethernet, Wi-Fi, TCP, and internet protocols. The data is transmitted via clear text, which allows dangerous hackers to use WireShark to view the clear text transmitted data and intercept your system. A hacker could easily discover the device using a Python script and use a tool like ...

State-Sponsored Espionage: Everybody loses

In a world where citizens depend on the government to survive everyday life, state-sponsored espionage, directly and indirectly, causes harm to citizens with little to no repercussions to the state-sponsored attackers. According to UtilityDive.com, "DOE Secretary Jennifer Granholm in June told CNN that enemies of the United States have the capability to shut down the U.S. power grid, and 'there are very malign actors trying, even as we speak'" (Walton, 2021, para 1). It suggests that citizens suffer at the hands of state-sponsored espionage. While it may be true that state-sponsored espionage has a broader impact than corporate espionage, corporate espionage drastically affects the market. Investopedia defines Corporate espionage as "stealing proprietary information, trade secrets, or intellectual property from a business and giving or selling it to another. The primary intent behind corporate espionage is to use the acquired information to gain a competitive adv...