Free e-Newsletters

Free e-Newsletters
Send us an email to get on our email list for the newsletters.
In addition to the comprehensive training in the various risk environments we conduct, we are also providing a series of Risk Newsletters that discuss specific risks & recommend actions to take, training to get or contingencies to put in place to control or plan for each risk occurring. This series of newsletters responds to questions received from Business Owners & employees & discusses what can affect you & how you should respond to protect your business, your employees & yourself. If you have any questions or comments & want to subscribe, let me know.

5 Sept 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Mysterious Fake Cell Phone Towers Are Intercepting Calls All Over The US
Banks: Credit Card Breach at Home Depot

Download "Newsletter 5 September 2014.pdf"

1 Sept 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Why Your Passwords Should be at Least 24 Characters Long
HardCoded Backdoor Found in China-made Netis, Netcore Routers

Download "Newsletter 1 September 2014.pdf"

25 August 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
200 Hospitals Hit Affecting 4.5 Million Patients
Malicious software in cash registers could affect more than 1,000 US retailers, gov't warns

Download "Newsletter 25 August 2014.pdf"

22 August 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Hacking Traffic Light Systems
Does Google have the right to scan user emails?

Download "Newsletter 22 August 2014.pdf"

10 August 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
How to Weaponize your Cat to Hack Neighbors' Wi-Fi Passwords
Warning — Facebook Color Changer App is Just a Scam

Download "Newsletter 10 August 2014.pdf"

8 August 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Here's Looking at You: How Personal Health Information Is Being Tracked and
Used
Over One Billion Passwords Served

Download "Newsletter 8 August 2014.pdf"

30 July 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
8 Cyber-Crimes Expected to Exponentially Increase in Next 20 Years

Download "Newsletter 30 July 2014.pdf"

27 July 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
No slowdown this summer on the cyber risk & data breach front.

Download "Newsletter 27 July 2014.pdf"

20 July 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Beware Keyloggers at Hotel Business Centers
The Rise of Thin, Mini and Insert Skimmers

Download "Newsletter 20 July 2014.pdf"

12 July Cybersecurity Newsletter

Thumbnail 220x PDF
Oracle Not Updating Java for Windows XP
The Internet of Things: Smart Light bulb Exposes Wi-Fi Password
DailyMotion users redirected to exploits in pay-per-click ruse
Crooks Seek Revival of ‘Gameover Zeus’ Botnet
Hackers Reveal Nasty New Car Attacks

Download "Newsletter 12 July 2014.pdf"

20 June 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Pentagon: Missile defenses vulnerable to cyber attack
P.F. Chang's Breach: Predates Target?
Code hosting Code Spaces destroyed by extortion hack attack

Download "Newsletter 20 June 2014.pdf"

15 June 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Ninth Grade Students Hack into ATM Machine during School Lunch Break
Security is a Journey, Not a Destination

Download "Newsletter 15 June 2014.pdf"

1 June 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Preparing for and Responding to the Next Heartbleed

Download "Newsletter 1 June 2014.pdf"

20 May Cybersecurity Newsletter

Thumbnail 220x PDF
Cybercrime Boss Offers Ferrari Prize for Most Lucrative Online Attack
Postal Service: Beware Stamp Kiosk Skimmers

Download "Newsletter 20 May 2014.pdf"

28 April 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
DHS Says Stop Using Internet Explorer - Use of Other Browsers Recommended
Until Situation Remediated
Microsoft warns of serious Internet Explorer flaw, but fix won’t cover XP users
Windows XP Is Alive And Well in ICS/SCADA Networks

Download "Newsletter 28 April 2014.pdf"

14 April Cybersecurity Newsletter

Thumbnail 220x PDF
Breach Affects Government Contractors - 80,000 Individuals Impacted in Deltek Compromise
Crimeware Helps File Fraudulent Tax Returns

Download "Newsletter 14 April 2014.pdf"

5 April 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
U.S. States Investigating Breach at Experian
One Chart Shows Why You Shouldn’t Trust the Feds With Your Data

Download "Newsletter 5 April 2014.pdf"

31 March Cybersecurity Newsletter

Thumbnail 220x PDF
Google Glass Partnership: What It Means For Privacy and Security
Cyber-Security To Be Taught In UK Schools

Download "Newsletter 31 March 2014.pdf"

12 March 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Who's spying on you?
Facebook Watch Naked Video of Friends clickjacking scam
Credit card chip technology
Cumulative security update for internet explorer

Download "Newsletter 12 March 2014.pdf"

6 March 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Thieves Jam Up Smucker’s Web Site
Chameleon Virus that Spreads Across WiFi Access Points like Common Cold

Download "Newsletter 6 March 2014.pdf"

21 February 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Fire Sale on Cards Stolen in Target Breach
TRENDS IN INCIDENT RESPONSE IN 2013 OVERVIEW

Download "Newsletter 21 February 2014.pdf"

17 February 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Cryptolocker scrambles US law firm's entire cache of legal files - Trojan looked like voicemail attachment
US CERT Alert (TA13-309A) CryptoLocker Ransomware Infections

Download "Newsletter 17 February 2014.pdf"

12 February Cybersecurity Newsletter

Thumbnail 220x PDF
Scam Website Targets Army Info Bogus Benefits Site Collects Service Member Log-Ins
Fake Funeral Notice
An Important Thing You Need to Know About “Deleted” Files

Download "Newsletter 12 February 2014.pdf"

23 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Bluetooth Enabled Card Skimmers planted at Gas Stations lead to $2 Million Heist
4 Strategies for Protecting Your Credit/Debit Card at the Gas Pump

Download "Newsletter 23 January 2014.pdf"

20 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
DHS Alerts Contractors to Bank Data Theft
Ransomware is becoming a major problem for businesses and individuals

Download "Newsletter 20 January 2014.pdf"

15 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Target: Names, Emails, Phone Numbers on Up To 70 Million Customers Stolen
More well-known U.S. retailers victims of cyber attacks - sources

Download "Newsletter 15 January 2014.pdf"

12 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Target: Names, Emails, Phone Numbers on Up To 70 Million Customers Stolen
Firm Bankrupted by Cyberheist Sues Bank

Download "Newsletter 12 January 2014.pdf"

5 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Prison Locker Ransomware, an upcoming malware threat in 2014
Hackers steal from ATMs using Malware-loaded USB Device

Download "Newsletter 5 January 2014.pdf"

2 January 2014 Cybersecurity Newsletter

Thumbnail 220x PDF
Lessons Learned (Hopefully) From the Target Data Breach

Download "Newsletter 2 January 2014.pdf"

19 December 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
LOCKER Malware - Yet another new variant of CryptoLocker Ransomware
Cyber Hygiene with Critical Security Controls

Download "Newsletter 19 Dec 2013.pdf"

12 December 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
With each new year, comes a new round of cybersecurity risks – and
most of the old ones are still risks also.

Download "Newsletter 12 Dec 2013.pdf"

16 November 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
Cyber Monday and Online Shopping Season: What You Need to Know to Protect
Yourself

Download "Newsletter 16 Nov 2013.pdf"

3 November 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
CryptoLocker Ransomware – A Global Threat
“Intelligent Devices” Being Used to Spy
Insurance: Irresistible to Cyber Criminals ?

Download "Newsletter 3 Nov 2013.pdf"

Cybersecurity Newsletter 25 October 2013

Thumbnail 220x PDF
Hackers Stole $100,000 from Users of a California ISP
Obamacare launch spawns 700+ cyber-squatters capitalizing on
Healthcare.gov, state exchanges

Download "Newsletter 25 Oct 2013.pdf"

Cybersecurity Newsletter 20 October 2013

Thumbnail 220x PDF
New Security Threat: Cash Register Skimmers
Scared of an Online Password Hack? Here’s How to Help Prevent It

Download "Newsletter 20 Oct 2013.pdf"

Cybersecurity Newsletter 16 October2013

Thumbnail 220x PDF
Helping Companies Understand The Risks of Handling Credit Cards

Download "Newsletter 16 Oct 2013.pdf"

Cybersecurity Newsletter 14 October 2013

Thumbnail 220x PDF
Open Enrollment Is Phishing Season
Fraudsters Target Those Signing Up for Health Insurance
A recent healthcare-related spear-phishing incident at St. Louis University
Breaches: Holding Retailers Accountable

Download "Newsletter 14 Oct 2013.pdf"

8 October 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
Vulnerabilities in MS Word Could Allow Remote Code Execution
Cumulative Security Update for Internet Explorer

Download "Newsletter 8 Oct 2013.pdf"

October 1, 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
Mobile Browsing - Is Your Company at Risk?
Social Engineering Example – Spear Phishing

Download "Newsletter 1 Oct 2013.pdf"

27 September 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
Beta Bot: A New Trend in Cyber-Attacks
The Basics of Social Engineering

Download "Newsletter 27 Sept 2013.pdf"

17 September 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
When is Enforcement of Security Policies Effective?

Download "Newsletter 17 Sept 2013.pdf"

5 September 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
How Online Bank Fraud Could Destroy Your Business
Online Banking Thieves Pose as Victims In 2 New Scams

Download "Newsletter 5 Sept 2013.pdf"

CyberSecurity Newsletter 1 Sept 2013

Thumbnail 220x PDF
Recent Retail Breaches Connected
Malicious Software Pretends to be your Friend on Facebook, Hijacks your Account

Download "Newsletter 1 Sept 2013.pdf"

Cybersecurity Newsletter 25 August 2013

Thumbnail 220x PDF
The End Is In Sight – For Windows XP Support that is.
New Version of Email Scam (At least to me)

Download "Newsletter 25 August 2013.pdf"

Cybersecurity Newsletter 20 August 2013

Thumbnail 220x PDF
Baby-monitor hacker spies on and swears at sleeping 2-year-old
Perkele is a cyber crimeware kit designed to create malware for Android phones

Download "Newsletter 20 August 2013.pdf"

August 16 Cybersecurity Newsletter

Thumbnail 220x PDF
At $1.2M, Photocopy Breach Proves Costly
Cyber Sextortion – Something to warn our kids and employees about

Download "Newsletter 16 August 2013.pdf"

August 9 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
California Escrow Firm Shuttered after Losing $1.5 Million
A cyber-attack that hit Harbor Freight Tools and likely exposed card data processed at all 400 of its retail tool stores could rank among one of the biggest retail breaches this year.

Download "Newsletter 9 August 2013.pdf"

30 July 2013 Newsletter

Thumbnail 220x PDF
Recent Reports of DHS-Themed Ransomware
and a description of the DOJ Themed Ransomware

Download "Newsletter 30 July 2013.pdf"

24 July 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
Scams About The Royal Baby Lead To Identity Theft and How To Avoid Online Scams

Download "Newsletter 24 July 2013.pdf"

17 July 2013 Cybersecurity Newsletter

Thumbnail 220x PDF
11 Really Dumb Things Not To Do With Your E-Mail

Download "Newsletter 17 July 2013.pdf"

Risk-Based Decision Making Commentary 3 July 2013 Newsletter

Thumbnail 220x PDF
• Cybercriminals Improve Android Malware Stealth Routines with OBAD

• Two Middle TN Mapco stores at risk in data breach

• The Various Ways That Criminals Can Monetize Hacked PCs

Download "Newsletter 3 July 2013.pdf"

Risk-Based Decision Making Commentary 11 June 2013 Newsletter

Thumbnail 220x PDF
Can Your Car Be Hacked??

5 Social Media Scams

Download "Newsletter 11 June 2013.pdf"

Risk-Based Decision Making Commentary February 2013 Newsletter #1

Thumbnail 220x PDF
Scammers Target Businesses with Fake E-Mails

Critical Safety Flaws Found in Millions of Home & Office Devices

Got Money ? You are a Prime Target for Identity Thieves

Download "Newsletter Feb 10 2013.pdf"

Risk-Based Decision Making Commentary February 2013 Newsletter #2

Thumbnail 220x PDF
Multiple Google Chrome Vulnerabilities Could Allow for Remote Code Execution

Small firm hit by 3-year hacking campaign puts face on growing cyber problem

Download "Newsletter Feb 20 2013.pdf"

Risk-Based Decision Making Commentary March 2013 Newsletter #1

Thumbnail 220x PDF
Android App Licenses Sold in Malware Black Market

Scam artists use clever schemes to defraud. And they are getting better at it.

Download "Newsletter March 10 2013.pdf"

Risk-Based Decision Making Commentary March 26 2013 Newsletter

Thumbnail 220x PDF
Do You Know How to Secure Your Mobile Device?

The U.S. Secret Service Electronic Crimes Task Force

Download "Newsletter 26 March 2013.pdf"

Risk-Based Decision Making Commentary April 2 2013 Newsletter

Thumbnail 220x PDF
FTC Releases Top 10 Complaint Categories for 2012

Attackers Exploited Vulnerabilities in ATM Networks Connecting to Bank VPNs
and GSM/GPRS Networks, Malware Infected ATMs and POS Systems.

Protect Your Identity During Tax Season

Download "Newsletter 2 April 2013.pdf"

Risk-Based Decision Making Commentary April 10 2013 Newsletter

Thumbnail 220x PDF
Secure Your Facebook Timeline

vSkimmer Botnet Targeting Payment Card Terminals Connected to Windows

Spear-Phishing Attack Targeting Android Devices

Download "Newsletter 10 April 2013.pdf"

Risk-Based Decision Making Commentary 17 April 2013 Newsletter

Thumbnail 220x PDF
Scammers Target People With Fake E-Mails About the Boston Explosions

Schnuck’s Data Breach Exposes 2.4 Million Credit Cards

Download "Newsletter 17 April 2013.pdf"

Risk-Based Decision Making Commentary 22 April 2013 Newsletter

Thumbnail 220x PDF
HIPPA Requirements for Business Associates

Android Malware

Download "Newsletter 22 April 2013.pdf"

Risk-Based Decision Making Commentary 1 May 2013 Newsletter

Thumbnail 220x PDF
What Does the Internet Know About You?

Social oversharing

What you can do

Download "Newsletter 1 May 2013.pdf"

Risk-Based Decision Making Commentary 8 May 2013 Newsletter

Thumbnail 220x PDF
Android Anti-Virus Software Easily Fooled

What security secrets might an attacker unearth about your business on Dropbox?

Malicious Flash Player Updates Hosted on Dropbox

New Yahoo Accounts Have Dropbox

Download "Newsletter 8 may 2013.pdf"

Risk-Based Decision Making Commentary 12 May 2013 Newsletter

Thumbnail 220x PDF
7 Ways to Protect Your Small Business (or any business) from Fraud and
Cybercrime

Protect Your Credit Cards and Bank Accounts

Secure Your IT Infrastructure

Use a Dedicated Computer for Banking

Have a Password Policy

Educate Your Staff

Consider Employee Background Checks

Insure Your Business

Download "Newsletter 12 may 2013.pdf"

Risk-Based Decision Making Commentary 28 May 2013 Newsletter

Thumbnail 220x PDF
What is the Future of Privacy?

If You Want True Privacy, Use Something Other Than Skype

Xbox One surveillance machine privacy

Download "Newsletter 28 May 2013.pdf"

Risk-Based Decision Making Commentary July 2012 Newsletter

Thumbnail 220x PDF
Why Should Small Businesses Use Risk Management?

Latest Cyberspace Recommendations

Download "Newsletter July 2012.pdf"

Risk-Based Decision Making Commentary August 2012 Newsletter

Thumbnail 220x PDF
Credit and Debit Card Acceptance Security Standards

Identity Theft - Children’s Identity

Download "Newsletter August 2012.pdf"

Risk-Based Decision Making Commentary August 2012 Newsletter #2

Thumbnail 220x PDF
Hackers Do Target Small Businesses

Bogus Vendor Bills Bucket

Download "Newsletter Aug 2 2012.pdf"

Risk-Based Decision Making Commentary September 2012 Newsletter

Thumbnail 220x PDF
Hackers Do Target Small Businesses

Bogus Vendor Bills Bucket

Download "Newsletter Sept 2012.pdf"

Risk-Based Decision Making Commentary September 2012 Newsletter #1

Thumbnail 220x PDF
New Media – Old Risks, Risks of Using Social Media

College Student Identity Theft

Download "Newsletter Sept 1 2012.pdf"

Risk-Based Decision Making Commentary September 2012 Newsletter #3

Thumbnail 220x PDF
Copier Data Security: A Guide for Businesses by the FTC

FTC Halts Computer Spying

Download "Newsletter Sept 3 2012.pdf"

Risk-Based Decision Making Commentary October 2012 Newsletter #1

Thumbnail 220x PDF
Personal Data Theft

Apple Device ID Targeted

Download "Newsletter Oct 2012 1.pdf"

Risk-Based Decision Making Commentary November 2012 Newsletter #2

Thumbnail 220x PDF
Mobile Device Malware Risk Increases

Are Your E-Mails Really Private – NO!

Download "Newsletter Nov 2012 2.pdf"