Blog

/Blog/

Connecticut Public Act No. 21-119: Cyber Security Standards for Businesses

Hello everyone and thanks for stopping by. We wanted to take a quick minute to highlight what Connecticut Governor Ned Lamont recently signed into the law other day.  Before we dive in, an obligatory disclaimer.  We are not lawyers.  This post is not considered legal advice or a legal opinion.  We urge you to consult [...]

Why ransomware attacks keep happening

Based on reporting and our own observations, here are some reasons why ransomware isn't letting up any time soon: Cyber liability insurance policies with ransomware/extortion policies in them have incentivised attackers. The bad actors know that if their victim organization has a cyber extortion policy, they'll be paid. Some industries, like healthcare, may end up [...]

How does an unauthorized user gain access?

To start, an unauthorized user is someone who doesn't have permission to access a computer or a system. Unauthorized access is bypassing security policies and controls to said computer or system. Here are a few ways this happens: In Verizon's 2021 Data Breach Investigations Report, the FBI's 2020 Internet Crime Report, and EUROPOL's Internet Organized [...]

Project Warwalk: Warmarketing, Big Data, and Surveillance

Hello friend. For those following this series, welcome back! For the newcomers, you can catch up here for the Project Warwalk articles and the glossary. Today we’ll be talking about something we’re calling Warmarketing, which we’ll define below, as well as big data, and surveillance issues with regard to wireless devices and IoT. When we [...]

Project Warwalk: PII, Social Engineering, and OSINT

Welcome back to the sixth entry of our research project, Project Warwalk. If this is your first time here, hello! To read the other entries related to this series and check out the glossary, click here . This entry to this series marks a distinctive shift when we’re talking about WiFi and specifically SSIDs. The [...]

Project Warwalk: Connected Devices and IoT

Welcome back and thanks for stopping by! For those new here, thanks for checking out Project Warwalk. You can check out all of our articles in the series here and visit the glossary to look up any terms. This entry is going to discuss network connected and IoT (Internet of Things) devices. We’ll be talking [...]