• HOME

  • ABOUT

  • SOLUTIONS

  • PAPERS AND PUBLICATIONS

  • CONTACT

  • Blog

  • More

    washingtoncybercenter.com

    © 2023 by Marketing Solutions. Proudly created with Wix.com

    MacEwan University’s Epic Fail: Business Email Compromise (BEC) Claims Another Victim

    September 29, 2017

    |

    Charles Parker, II

    There have been few attacks in the last five years that have been more success overall and on average than the phishing campaigns that have run rampant through the global email systems. The users seem to want to click, click, click, and click again on the links and ima...

    Read More

    Vicious cyber-attack on school district

    September 25, 2017

    |

    Carolyn Schrader

    Over 15,000 elementary and high school students were impacted by one horrific cyber-attack last week.

    An entire school district in Flathead Valley, Montana was the victim of a vicious attack starting on Wednesday, September 13, 2017. An initial threat was sent to a high...

    Read More

    Note to HR: InfoSec Applicants are not Necessarily Mainstream Or Ode to the InfoSec Personnel Paradigm Shift

    September 22, 2017

    |

    Charles Parker, II

     They say the only constant is change. This is exceptionally applicable to the IT area and personnel at this junction. This is representative of the new workforce as they change with the times. The implementation of technology at early ages has had a distinct force on...

    Read More

    Small Businesses should do a Risk Assessment on Kaspersky Software

    September 18, 2017

    |

    Carolyn Schrader

    Business is full of risk management opportunities. Every business has unique factors that may indicate a specific action. The recent announcement by Department of Homeland Security (DHS) acting secretary Elaine Duke about removal of Kaspersky cyber security software fr...

    Read More

    BootStomp: Useful Tool in Researching Bootloaders

    September 15, 2017

    |

    Charles Parker, II

    Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device is started. As the bootloader is trusted to have not been adulterated, it is the beginning of the integrity chain throughout the process....

    Read More

    Lessons learned for small businesses from the Equifax data breach

    September 11, 2017

    |

    Carolyn Schrader

    Data on 143 million consumers was stolen from Equifax, which is estimated to be about 57% of all U.S. adults. The massive data breach was announced by the company, one of the three credit reporting agencies in America, on 9/7/17. According to Equifax, the breach occurr...

    Read More

    Bug Bounty Programs: Vehicle Specialty Often Difficult to Fill

    September 8, 2017

    |

    Charles Parker, II

    The need for bug bounty programs began years ago as a void formed. The manufacturers were producing their goods and services, as to be expected. An issue experienced was the manufacturers had the “first to market” mentality in place. There was and continues to be in ce...

    Read More

    Two Factor Authentication (2FA)

    September 4, 2017

    |

    Charles Parker, II

    The attackers are generally on the prowl for new methods and attack points in order to better their opportunity to steal from the user. Just as with any other business model, stagnation in improvements tend to be a detriment to the business.

    One area that is focused on...

    Read More

    Be Careful What You Share on Social Media

    September 1, 2017

    |

    Charles Parker, II

    People are focused on posting their daily lives on the various social media sites. This may include vacation photos and updates, birthday parties, sporting events, business trips, dinner parties, and virtually any other activity. The users do this without any reservati...

    Read More
    Please reload

    Cybersecurity, the Holiday Season and the Grinch

    December 6, 2019

    Cybersecurity, Vendors and Stolen Laptops

    December 2, 2019

    Cybersecurity and Dental Services

    November 29, 2019

    Cybersecurity and IT Firms

    November 25, 2019

    Cybersecurity and Small Town Attacks

    November 22, 2019

    Cybersecurity and Online Gaming

    November 18, 2019

    Cybersecurity, Backup Services and Ransomware

    November 15, 2019

    Cybersecurity, PLCs and DoS

    November 4, 2019

    Cybersecurity and Student Loans

    November 1, 2019

    Cybersecurity, Automobiles and Inverter Issues

    October 28, 2019

    Please reload

    Recent Posts
    Archive

    December 2019 (2)

    November 2019 (7)

    October 2019 (7)

    September 2019 (9)

    August 2019 (10)

    July 2019 (8)

    June 2019 (9)

    May 2019 (10)

    April 2019 (9)

    March 2019 (10)

    February 2019 (8)

    January 2019 (9)

    December 2018 (8)

    November 2018 (9)

    October 2018 (9)

    September 2018 (7)

    August 2018 (9)

    July 2018 (9)

    June 2018 (11)

    May 2018 (6)

    April 2018 (9)

    March 2018 (9)

    February 2018 (8)

    January 2018 (6)

    December 2017 (8)

    November 2017 (7)

    October 2017 (10)

    September 2017 (9)

    August 2017 (10)

    July 2017 (8)

    June 2017 (10)

    May 2017 (8)

    April 2017 (7)

    March 2017 (8)

    February 2017 (7)

    January 2017 (8)

    December 2016 (11)

    November 2016 (14)

    October 2016 (14)

    September 2016 (8)

    August 2016 (1)

    July 2016 (1)

    June 2016 (1)

    Please reload