Blog
What Is An SSL Certificate and Why Should You Care?

What Is An SSL Certificate and Why Should You Care?
We all know by now, the ‘bad guys’ are coming after our systems and data.
To infect us, to steal our data, and to encrypt our systems for ransom.
To protect ourselves, we need both technology tools and the ‘human awareness’ firewall.
An SSL Certificate is one cyber security mechanism to help us be sure that we are navigating to the actual site we intend to visit, and not some crooked impersonator.
- For sites we visit, an SSL Certificate adds protection of legitimacy.
- For our own website, if we do not have an SSL Certificate, visitors may see a message warning them that our site is not safe, thus driving them away.
We all know by now, the ‘bad guys’ are coming after our systems and data. To infect us, to steal our data, and to encrypt our systems for ransom. To protect ourselves, we need both te...
Is Microsoft Backing Up Your Office 365 emails?

True or False
Microsoft is Backing Up Your Office 365 emails?
Answer: Limited, not the full protection many assume.
Microsoft provides limited data replication for about 30 days. However, limited replication may not cover common situations where you want to recover an email you inadvertently deleted.
Microsoft replicates Office 365 data primarily to protect against hardware failure in their data centers. This is not the same as backing up the data. If a user or malicious program deletes or corrupts data, that corruption or missing data replicates across multiple servers. This is a problem if the User wants to restore specific data, outside the policies and retention period in place at the time.
Complicating the risk, a recent study found that 64% of data lost was unintentional User action!
What can you do to ‘get your data back’ when you need it?
Answer: Limited, not the full protection many assume. Microsoft provides limited data replication for about 30 days. However, limited replication may not cover common situations where you...
Using Home Computers to Access the Office

Using Home Computers
To Access The Office
Telecommuters Beware
To Access The Office
Telecommuters Beware
For many, telecommuting is a welcome part of modern life.
However, home computers present a cyber security challenge to the worker and the corporate network.
Here are the top three vulnerabilities of connecting from home computers
For many, telecommuting is a welcome part of modern life. However, home computers present a cyber security challenge to the worker and the corporate network. Here are the top three vulne...
KRACK Attack Breaks Wi-Fi Security

KRACK Attack
Breaks Wi-Fi Security
Cyber Security Risk to You
Breaks Wi-Fi Security
KRACK, a recently discovered flaw in Wi-Fi security, allows hackers to eavesdrop and capture your private communications. This includes capturing your passwords, credit card numbers, and other sensitive data.
Is your Wi-Fi safe from a KRACK attack?
Unfortunately, probably not.
KRACK, a recently discovered flaw in Wi-Fi security, allows hackers to eavesdrop and capture your private communications. This includes capturing your passwords, credit card numbers, and o...
Arthur Press Elected President of Information Systems Security…

Arthur Press Elected President
Information Systems Security Association
Ventura County (ISSA-VC)
Arthur Press is Principal Security Consultant with MBSG, providing IT support and systems consulting. He has helped dozens of companies improve their cyber security defenses.
The Information Systems Security Association (ISSA) is a not-for-profit, international organization of information security professionals and practitioners. ISSA provides educational forums, publications, and peer interaction.
Under Arthur's leadership, the Ventura county chapter (ISSA-VC) continues to grow, with the motto:
"We don't hold meetings. We hold trainings".
Arthur Press is Principal Security Consultant with MBSG, providing IT support and systems consulting. He has helped dozens of companies improve their cyber security defenses. ...
Keys and Physical Security - Beyond Cyber Security

Keys and Physical Security
Beyond Cyber Security
Now, anyone can take a picture of your key and make an exact duplicate.
Services like Key.me present a major challenge for security professionals. Key.me has a smartphone app that allows you to digitally scan any key and make a real, physical copy.
-
Handy for you. To make spare keys.
-
Dangerous for you. Anyone with 30 seconds access to your key can make a duplicate.
Keys and Physical Security Beyond Cyber Security
Best Practices for Guest Wi-Fi

Best Practices for Guest Wi-Fi
Cyber Security Tip
Does your company provide Guest Wi-Fi for visitors, vendors, consultants, or others? If so, how secure are you from prying eyes on your corporate network?
You might be surprised to learn – not very.
Many of the companies we visit provide wi-fi access for visitors. Very convenient and thoughtful. However, often not safe
How secure is your corporate Wi-Fi from prying eye?. Cyber Security best practices
How To Browse The Internet Anonymously

Cyber Security Tip:
How To Anonymously BrowseThe Internet
It is Easy to Hack Your Computer on Public Wi-Fi
Public Wi-Fi is a major cyber security risk. Imagine you are in the Coffee Shop, ready to partake of free Wi-Fi. Did you notice the nice young man sitting in the corner sipping his Grande Caramel Macchiato? He might be hacking into your laptop.
You might ask, how could that be?
- You use complex passwords.
- You use Privacy mode on my browser.
- You use HTTPS
Sorry Homer. Anywhere that you use public Wi-Fi, your network security is at risk.
It is Easy to Hack Your Computer on Public Wi-Fi Public Wi-Fi is a major cyber security risk. Imagine you are in the Coffee Shop, ready to partake of free Wi-Fi. Did you notice the nice y...