412-515-3010

Security Hacking Stories

Search

Don't be fooled by the hackers.
By Admin - 12/6/2017 Don't be fooled by the hackers. I have many connections on LinkedIn, and as an internationally recognized Cybersecurity professional, I am constantly tested by the hackers, that want to make a name for themselves.

Did You Know? - WiFi Assist
By AlbertWhale - 12/3/2017 Did You Know? - WiFi  Assist We use our Cell Phones and the Internet daily.  But if you live in an area where the Cell Phone coverage is not the Best, what can you?

Tis the Season of Giving Back - FREE Service Offering
By Admin - 11/30/2017 Tis the Season of Giving Back - FREE Service Offering IT Security is offering Free Services during the Season of Giving Back, which is now through the end of December. We are offering these three services for Free for your organization.

Your IT Department is not a Security Team
By AlbertWhale - 11/5/2017 Your IT Department is not a Security Team Most organizations have an excellent resource internally, being their IT Department.  These talented individuals work tirelessly to keep the equipment up to date, and operational.  They are extremely beneficial and resourceful in that manner. Please be careful, your IT Department is not your Security Team. There is a huge difference here.

Don't wait, until it's too late
By AlbertWhale - 11/5/2017 Don't wait, until it's too late Its hard to believe that most of the businesses I have seen leave a lot open to the Hackers, and have no way to deal with the intrusion, because they don't know it's happening. IT Departments seem to go through the motions, without having an understanding on what is important, and why it is as well.

Securing Data in Motion
By Admin - 10/7/2017 Securing Data in Motion Cybersecurity professionals have long fought the battle of securing their environment from attackers, that seem to find a way in anyway.  A new technology which eliminates access to the valuable data, makes this technique a game changer for improving the organizations security.   IT Security recommends that we must our improve cybersecurity methodology. In doing so, cybersecurity must secure the Network, the Applications being used and the Data within the network.

GEICO can save you 20%, IT Security can save you 100% of your business.
By AlbertWhale - 9/2/2017 GEICO can save you 20%,  IT Security can save you 100% of your business. Are you looking forward to saving a few hundred dollars on Insurance, or would you like your business to continue through the next wave of Hackers, and Business regulations?

Flash back to 2014 - Chinese Hackers hit Pittsburgh Businesses
By Admin - 5/15/2017 Flash back to 2014 - Chinese Hackers hit Pittsburgh Businesses Chinese Hackers from the Chinese Blue Army hit the Global Corporation Centers of Industry in Pittsburgh, PA.

Software Vulnerability Taxonomy
By Admin - 12/2/2016 Software Vulnerability Taxonomy Bugs, Vulnerabilities, Defects, and other names? What's in a name? If the name maters to you there are many ways for us to classify the name, but in the end, helping the developer fix the problem is the real issue.

PCNC - Night Talk with Ellis Cannon
By Admin - 9/6/2016 PCNC - Night Talk with Ellis Cannon Ellis Cannon Host of NightTalk - @EllisCannon - Aug 30 At 8:00 @SalenaZito talking Hillary emails, Trump immigration, FBI notes on Hillary & @AWhalePgh on if election cd be hacked @PCNCnighttalk ! Not to mention that Dogs understand English (or do they?)!

Vendor generated STIGs Help DISA Accelerate New Technology Adoption
By Admin - 9/6/2016 Vendor generated STIGs Help DISA Accelerate New Technology Adoption New technologies are introduced all the time, and every product vendor touts the advantages of its new products. But ensuring it’s safe to connect those new systems to secure military networks can be a dicey proposition. That’s why the Defense Information Systems Agency issues STIGS – Security Technical Implementation Guides – for high-demand information technology products.

PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016
By Admin - 7/11/2016 PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016 The PCNC show called Night Talk with Ellis Cannon is a great show which discusses current events information, and always has interesting Guests on the show to have conversations with. Our President, Albert Whale, was on the July 6th show to discuss a variety of topics.

Never 10
By AlbertWhale - 3/30/2016 Never 10 Never 10 is an easy to use utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. I don't always adopt a software package, but in this case, I'm making an exception, so that I can protect my Security.

Evolving Malware Means Evolving Security
By Admin - 11/5/2015 Evolving Malware Means Evolving Security Some people are having a hard time understanding that Security is a Mandate, and they either need to step up, or become irrelevant. Malware has taken a turn to become a more virulent opponent. Is your environment prepared?

Perfect Security in three easy steps.
By Admin - 11/3/2015 Perfect Security in three easy steps. Some of my clients believe that the firewalls and Virus scanners they own are all that is really needed to keep them safe and protected. Here's a look at one reality that I help all of my clients avoid. Reposted with permission by Peter Herzog.

There's No Free Lunch for Security
By Admin - 10/4/2015 There's No Free Lunch for Security There is no FREE Lunch when it comes to Cyber Security. Many organizations believe that they can ignore the implementation of security in their organization, at least until they have been hacked. By the time that this occurs however, it's too late. Unfortunately by that time, they cannot get the information back.

Compliance is not Security.
By Admin - 9/25/2015 Compliance is not Security. This Summer (July 2015), it was announced that yet another United States Government agency was hit with a security breach.  The Federal Census Bureau released that the breach did have data related to census and surveys done by the fed, although no personal information of those surveyed was infiltrated by hackers.

Is Free Wifi something that you use?
By Admin - 9/15/2015 Is Free Wifi something that you use? Every day, tens of millions go to their nearest public Wi-Fi hotspots: cafes, restaurants, hotels, libraries, you name it.  Many places make it easy to access quickly.  But what rights are you losing as you log into one of these internet providers?

Unplugging did not stop them.
By Admin - 7/27/2015 Unplugging did not stop them. Has the PlayStation network been breached again?

Hacking scandal not about cheating
By Admin - 7/10/2015 Hacking scandal not about cheating St. Louis Cardinals manager Mike Matheny talks with the media before a game against the Minnesota Twins on Tuesday in St. Louis. Federal law enforcement authorities are investigating whether the Cardinals hacked into a computer database of the Astros to obtain information on players.

The Obama Administration Introducing Legislation for Breach Notification
By AlbertWhale - 1/18/2015 The Obama Administration Introducing Legislation for Breach Notification President Obama is proposing a national data breach notification law that would require businesses to notify consumers within 30 days of a breach. The Personal Data Notification and Protection Act, if enacted, would supersede nearly four dozen state statutes that regulate data breach notification. The bill is one of a series of measures Obama proposed in a speech delivered Jan. 12 at the Federal Trade Commission. He contends the proposal is aimed at protecting American companies, consumers and infrastructure from cyberthreats while safeguarding privacy and civil liberties.

The 10 Worst Security Incidents Of 2014 Breaches (plus one)
By Admin - 1/9/2015 The 10 Worst Security Incidents Of 2014 Breaches  (plus one) It is difficult to pick only 10 Security Incidents in 2014, that is why we have added an additional entry to the top ten list, the Sony Breach for the Interview.