Cybersecurity ThreatsNetwork SecurityPress ReleasesRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 2 What is NotPetya? Last time I talked about the backstory of NotPetya, a string of…Kip BoyleMarch 31, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 5 This blog post originally published in 2018. Fire, Flood, and Cybersecurity In some respects, cybersecurity…Kip BoyleMarch 17, 2020
Cybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 3 In recent weeks I’ve been talking about the millennial mobster and the reality that savvy…Kip BoyleMarch 3, 2020
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityPodcastsQuestions & AnswersView All Resources What are some little-known cybersecurity incursions of the early 21st century? How about a great story about a cybersecurity incursion in the late 20th century? What’s…Kip BoyleFebruary 11, 2020
Cybersecurity Executive ToolkitCybersecurity ThreatsQuestions & AnswersRecent Cyber AttacksView All Resources What would a cyber war look like? I’m going to answer this question with a question: Did you know there are at…Kip BoyleDecember 17, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How long, on average, does it take a company’s stock value to recover after a data breach? “Share prices of breached companies hit a low point approximately 14 market days following a…Kip BoyleNovember 12, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How can I delete all the information in my computer? For routine uses, I recommend “Darik's Boot and Nuke” (DBAN) using the “DoD Short” method.…Kip BoyleOctober 29, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How good is Dashlane password management software? I’m not sure about Dashlane, but I can help you figure it out. Password managers…Kip BoyleOctober 22, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources Who creates computer virus, trojan, malware and ransomware, and why? The motivations for releasing malicious code onto the public Internet fall into four broad categories:…Kip BoyleOctober 15, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources Can malware actually damage PC hardware? As the Shamoon and NotPetya disk wiper malware have shown, an infected computer in a…Kip BoyleOctober 8, 2019