by Micheal Delamere | Aug 22, 2014 | Business Loss
According to a survey of businesses IT managers worldwide, 21% of manufacturers suffered a loss of intellectual property (IP) within the past year. Malware was the most common cause of data loss incidents for manufactures, although other types of cyber-incidents – including software vulnerabilities, theft of mobile devices, network intrusion, etc. – were also cited as sources IP leakage.
In a highly competitive global economy, businesses rise to leadership or sink into bankruptcy on very slim profit margins. Most often, a business’s most decisive advantage comes in the form of Research & Development insight or a proprietary high-tech solution which, in the case of manufacturers, can help businesses produce items more efficiently than their competitors. If a competitor is able to obtain this insight, especially without incurring the initial R&D costs, then that competitor now has a significant business advantage.
The manufacturing industry clearly understands the importance of securing their intellectual property. The survey found that…
Read More
by Micheal Delamere | Aug 17, 2014 | Crime, Cyber Threats
SCAM WARNING: A supposed IRS agent named “James Flores” with a Russian accent called me from (917) 300-3104 to let me know that if I didn’t wire them $5,000 within one hour, officers would arrive at my house and arrest me.
We had a great conversation re the IRS not soliciting money by phone or e-mail, the FTC, FBI – Federal Bureau of Investigation, FCC, and how many folks I recommend they send prior to his screaming at me and hanging up.
He later called back from (609) 858-6398 and said his name was Tony Beck. Same guy… different state and phone number. I waited a few minutes before calling him “James” and asking him to spell his name. Sure enough J-A-M-E-S… but wait, I thought you were Tony this time? CLICK…
Useful information regarding IRS scams hitting our state in force right now:
To be clear… the IRS will never EVER solicit money by phone.
Oh, and don’t forget to report the attempt to the U.S. Department of the Treasury here: https://www.treasury.gov/tigta/contact_report_scam.shtml
Read More
by Micheal Delamere | Aug 12, 2014 | Crime, Surveillance & Security
What Is a Bug-Out-Bag?
A bug-out-bag (or BOB) is a survival bag (usually a rucksack) that contains the most important items you will require to survive after a disaster. The idea is to have the bag packed and ready to go, so you can grab it quickly, get out the door and get long-gone should a disaster happen.
What Should Go In the Bug-Out-Bag?
When planning your bug-out-bag you need to consider the three things that are vital to survival: water, shelter, and fire (in that order). Food is important, but not vital. Remember the (simple) rule of three, you can survive: 3 minutes without air, 3 days without water, and three weeks without food. In an extreme survival situation, I would also add 3 hours without fire and shelter. Below is a list of items. (in no specific order) you should consider adding to your bug-out-bag. Where possible we have included direct links to high-quality recommended products. We either have experience with these products, or they come very highly recommended by others.
Read More
by Micheal Delamere | Jul 22, 2014 | Cyber Threats, Data Breaches
Cyber Security is now part of all our lives. “Patches” and other security updates arrive for phones, tablets, and PCs. Consultants remind us all not to open unknown files or plug unfamiliar memory sticks into our computers. The bosses of some Western firms throw away phones and laptops after they have been to China assuming they have been hacked. And yet, as our special report this week points out, digital walls keep on being breached. Last year more than 800m digital records, such as credit- and debit card details were pinched or lost, more than three times as many as in 2012. According to a recent estimate by the Centre for Strategic and International Studies, a think-tank, the cost to the global economy of cybercrime and online industrial espionage stands at $445 billion a year—about as much as the GDP of Austria.
Now a new phase in this contest is emerging: “the internet of things”. This involves embedding miniature computers in objects and connecting them to the internet using wireless technology. Cisco, a technology company, predicts that 50 billion connected devices will be in circulation by the end of the decade, up from 11 billion last year. Web-connected cars and smart appliances in homes are becoming more common, as are medical devices that can be monitored by doctors many miles from their patients. Tech companies are splurging cash: witness Google’s punt on driverless cars and the $3.2 billion it has spent buying Nest, a maker of smart thermostats.
Read More