• HOME

  • ABOUT

  • SOLUTIONS

  • PAPERS AND PUBLICATIONS

  • CONTACT

  • Blog

  • More

    washingtoncybercenter.com

    © 2023 by Marketing Solutions. Proudly created with Wix.com

    New Attack with Seldom Used Vector: PowerSniff

    April 28, 2017

    |

    Charles Parker, II

    Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for personal profit, as a contract, or to prove a point (e.g. hacktivism). Usually these have been noted to operate in a narrow way. The traffic to the t...

    Read More

    Employee data sharing is still a cybersecurity weak link at small businesses

    April 24, 2017

    |

    Carolyn Schrader

    The statistics from a recent survey tell us businesses still have a challenge with cybersecurity behavior of their employees. Dell End-User Security Survey 2017 discovered that for small businesses:

    • 54% of employees connected to public Wi-Fi to access confidential w...

    Read More

    Tesco Bank: Oversight

    April 21, 2017

    |

    Charles Parker, II

    And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as much. The Swift system is currently being updated and upgraded so this does not occur again. Just as the banking industry begins to move back into its n...

    Read More

    iPhone Hack: One More Vulnerability

    April 17, 2017

    |

    Charles Parker, II

    When it is time for an upgrade or when the user simply wants a new phone, they arrive at their retailer and ask a few questions. The consumer purchases their new shiny iPhone and open the box with glee. They or the salesperson sets up the phone. The user generally at t...

    Read More

    PDFs: Still be wary

    April 14, 2017

    |

    Charles Parker, II

    Phishing is no different than other attack methodologies. These evolve over time. Initially the attack may be a bit unsophisticated and rough. These attacks tend to work for a bit, until a defense is put in place. At this point, the attack improves its operations or mo...

    Read More

    Insider Threats: Roots and Remediation

    April 7, 2017

    |

    Charles Parker, II

    Insider Threats: Roots and Remediation

    Charles Parker, II

    In 2015, nearly half of the federal agencies responding to a survey indicated they have been a target of insider threats. 20% of the respondents noted they had lost data due to this. Insider threats continue to be...

    Read More

    Select small business audiences need focused cybersecurity training

    April 3, 2017

    |

    Carolyn Schrader

    Now that everyone in your company has participated in basic cybersecurity awareness training and your IT people have done several phishing email exercises, it might be time for you to consider focused training for select employee audiences.

    Hackers continue to get more...

    Read More
    Please reload

    Cybersecurity, the Holiday Season and the Grinch

    December 6, 2019

    Cybersecurity, Vendors and Stolen Laptops

    December 2, 2019

    Cybersecurity and Dental Services

    November 29, 2019

    Cybersecurity and IT Firms

    November 25, 2019

    Cybersecurity and Small Town Attacks

    November 22, 2019

    Cybersecurity and Online Gaming

    November 18, 2019

    Cybersecurity, Backup Services and Ransomware

    November 15, 2019

    Cybersecurity, PLCs and DoS

    November 4, 2019

    Cybersecurity and Student Loans

    November 1, 2019

    Cybersecurity, Automobiles and Inverter Issues

    October 28, 2019

    Please reload

    Recent Posts
    Archive

    December 2019 (2)

    November 2019 (7)

    October 2019 (7)

    September 2019 (9)

    August 2019 (10)

    July 2019 (8)

    June 2019 (9)

    May 2019 (10)

    April 2019 (9)

    March 2019 (10)

    February 2019 (8)

    January 2019 (9)

    December 2018 (8)

    November 2018 (9)

    October 2018 (9)

    September 2018 (7)

    August 2018 (9)

    July 2018 (9)

    June 2018 (11)

    May 2018 (6)

    April 2018 (9)

    March 2018 (9)

    February 2018 (8)

    January 2018 (6)

    December 2017 (8)

    November 2017 (7)

    October 2017 (10)

    September 2017 (9)

    August 2017 (10)

    July 2017 (8)

    June 2017 (10)

    May 2017 (8)

    April 2017 (7)

    March 2017 (8)

    February 2017 (7)

    January 2017 (8)

    December 2016 (11)

    November 2016 (14)

    October 2016 (14)

    September 2016 (8)

    August 2016 (1)

    July 2016 (1)

    June 2016 (1)

    Please reload