Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources Who creates computer virus, trojan, malware and ransomware, and why? The motivations for releasing malicious code onto the public Internet fall into four broad categories:…Kip BoyleOctober 15, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources Can malware actually damage PC hardware? As the Shamoon and NotPetya disk wiper malware have shown, an infected computer in a…Kip BoyleOctober 8, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityView All Resources Are Cyber Attacks More Dangerous than Nuclear Attacks? While cyber-attacks cannot kill tens or hundreds of millions of people in a single action,…Kip BoyleJune 25, 2019
Cybersecurity Executive ToolkitNetwork SecuritySecurity Risk AsessmentView All Resources What Worries Cybersecurity Professionals the Most? A top concern is, “do I have a false sense of security?” In other words:…Kip BoyleJune 18, 2019
Cybersecurity Executive ToolkitNetwork SecurityView All Resources Are Xfinity Hotspots Secure? Xfinity hotspots are a brand of public WiFi. And all public WiFi has this in…Kip BoyleJune 11, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources What are the key topics you would cover in your initial one-hour basic training program on security for non-IT personnel? Q: What are the key topics you would cover in your initial one-hour basic training…Kip BoyleMay 28, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Can windows malware applications also infect other operating systems such as Linux and Mac? We're continuing in our series of blog posts that cover some of the most common…Kip BoyleMay 21, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources How often should I change my online passwords for maximum safety? Here are my best practices for online passwords: Do not reuse passwords with different accounts.…Kip BoyleMay 7, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 4 In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the…Kip BoyleApril 16, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 3 In recent weeks I’ve been talking about the millennial mobster and the reality that savvy…Kip BoyleApril 9, 2019