Quantcast
Channel: Security – Catapult Systems
Browsing all 29 articles
Browse latest View live

Reduce Risk and Make Office 365 More Secure

I’ve noticed a disturbing trend lately. Specifically for Office 365, I’ve seen too many organizations use Global Administrator accounts as their service accounts. This is a bad idea. We should not use...

View Article


Eight P(s) of Enterprise Information Security and Compliance

Forward Often, we hear security professionals talk about the application of “People, Process, and Products” as being the critical tenets of a good security program. While this overall statement is...

View Article


Part 1: IoT, When my Home Thermostat Becomes a Weapon

This will be a multi-segment series that takes a look at security surrounding the Internet of Things (IoT), where we’ll explore existing threats and delve into a few new ones.  Of course, we’ll close...

View Article

Part 2: IoT, When my Home Thermostat Becomes a Weapon

In the first segment (Part 1), I shared some viewpoints on Internet of Things (IoT) devices, namely using the home thermostat as an example.  In this, Part 2, let us take a look at some of the various...

View Article

Part 3: IoT, When my Home Thermostat Becomes a Weapon

In this, Part 3 of the series, let us continue to look at few more nasty security risks associated with insecure IoT devices.  Let’s continue… So, enough with the home thermostat, what about the “real”...

View Article


Article 0

I recently read an interesting article written by Paul Mazzucco, CTO at TierPoint, on Radware’s blog entitled, “See Through the DDOS Smoke-Screen to Protect Sensitive Data“. The article raises an...

View Article

Image may be NSFW.
Clik here to view.

Integrated Apps Ransomware Potential Exploit

I saw this exploit on LinkedIn and its fairly troubling.  Essentially if a user accepts a Third Party Add In to Outlook and grants it the right permissions, the hacker can encrypt their email and hold...

View Article

General Data Protection Regulation (GDPR) – Stuff you may or may not realize

The General Data Protection Regulation (GDPR) is a data privacy law in the EU (made law in April 2016) which has received a lot of recent attention in the United States, notably because the now...

View Article


Ah… the ol’ Deceptive Distributed Denial of Service

Preface: This blog is a recast of an article that I wrote and posted on Linked-in in January 2017. I recall an interesting and informative article written by Paul Mazzucco, CTO at TierPoint, on...

View Article


Lost Productivity as a Result of an Outage

Much attention is given to the calculated costs associated with a security breach, where the business may experience both downtime (an outage) as well as external costs as you’ll see below. We often...

View Article

Image may be NSFW.
Clik here to view.

Health Data (PHI) Breaches – The last 8 Years

Did you know that in the United States, the HITECH Act requires the Secretary of Health & Human Services to post a list of breaches of unsecured Protected Health Information affecting 500 or more...

View Article

Image may be NSFW.
Clik here to view.

memcached and massive Denial of Service attack (amplification attack), how to...

Two of the largest distributed denial-of-service attacks in the history of the “World Wide Webs” were launched this past week.  This particular attack (called a reflection and amplification attack)...

View Article

Just Wow! Facebook “shares/sells” 50 million user’s PII without their...

As Facebook continues to explain their inexplicable actions in the Cambridge Analytica scandal, it is clear that the Facebook probably can’t be trusted to regulate itself. Mark Zuckerberg Facebook CEO...

View Article


Under Armour Hacked… MyFitnessPal No Longer My Pal

It’s getting difficult for me to determine which security incidents to blog about… First up, Facebook‘s unauthorized sharing/selling of 50 million persons’ private information, a definite FTC violation...

View Article

Facebook’s big reveal… All 2.2 billion users’ personal data likely misused.

In my recent post about the Facebook and Cambridge Analytica debacle, I shared that 50 million Facebook users’ personal data was sold to Cambridge Analytica without the consent of the user.  Well…...

View Article


GDPR – Can you handle the 72-hour breach notification requirement?

Nearly every security professional knows that the European Union has unleashed a stringent new law called the General Data Protection Regulation (GDPR). Standing out among many complex mandates within...

View Article

Security tools overload? Security-as-a-Service will help

Catapult’s Spyglass security team sees this a lot, and that is, prospective clients with too few resources just trying to keep up: managing many disparate security and monitoring tools, trying to...

View Article


MayDay: questions and concerns from last-minute GDPR compliance seekers….

It’s been a very long week ushering in the infamous and inevitable May 25th GDPR enforcement go-live date.  I’ve been calling this day “MayDay”.  May 25th 2018 is going to feel like a Y2K moment to me,...

View Article

GDPR: Immediate Fallout

The Y2K Event of this decade? GDPR’s hype looked a lot like the millennium cyber-clock meltdown, according to some. But here’s a key difference: GDPR has actually spurred immediate, tangible changes to...

View Article

Image may be NSFW.
Clik here to view.

Azure RMS Super Users

Azure RMS and Azure Information Protection offer excellent tools to protect information in your organization.  Using them it is easy for end users to encrypt sensitive information so that no matter...

View Article
Browsing all 29 articles
Browse latest View live