Megamind Training Blog

Megamind Training Blog2017-03-31T21:29:17-07:00

Beware of Phishing Scams!

Beware! We are dealing with very TARGETED email scams, or PHISHING. When the economy is tough and more people are looking for jobs, phishers are having a field day... but many are getting caught TOO! Some Phishers who wasted a retired woman's 1.5 million life savings on cheeseburgers, champagne [...]

Hacking: Is The Security Summer Over Yet?

Compromise, Compromises, Wow, Summer has brought a lot of security headaches! Well, the entire August and the beginning of September have been very busy for the security community! A hacking ring had pilfered 1.2 billion user name and password combinations and more than 500 million email addresses. What should you [...]

HeartBleed, a Serious OpenSSL vulnerability

Unless you were hiding under a rock, you are probably aware that a major security flaw was discovered about a month ago, but had been existent for over 2 years. The implications are that during that time, many skilled malicious people from all over the world, could have been [...]

WiFi Everywhere: the Perfect Storm for Insecurity!

The year is 2014, a period in which we would seem to be fully dependent on wifi-everywhere, and technology to support our businesses, and personal commitments. 2014 is also a period in which society is fully engaged with technology, to conduct their online banking, to embrace the sales on [...]

CISM vs. CISSP: What’s the true value?

CISM® vs. CISSP® Understanding the Differences and their True Value There is a lot to know about the differences between the Certified Information Security Manager (CISM®)and the Certified Information Systems Security Professional (CISSP®). I have a unique perspective regarding skills and credentials for the successful IT professional.  With a background in [...]

You’ve Been Hacked! How to react.

In this second part of our hacking series post we will learn WHAT TO DO NEXT when a cyber or information security incident occurs. Usually all these steps should be well documented in an Information Security Policy or an Incident Response Policy.The Carnegie Mellon University And Software Engineering Institute provides many free [...]

Cybersecurity and Cyberwarfare

President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” As a result, the President directed a top-to-bottom review of the Federal [...]

Are Passwords Becoming Obsolete?

We hear this question from time to time, so we might as well address it at the start of this section on Access Controls. While a password is considered similar to your ATM card PIN number since it’s something you know, the implications run a bit deeper. Many organizations, [...]

Go to Top