Saturday, January 24, 2009

Data Encryption

Wanted to pass along an invaluable link for a program that will encrypt your system's information and provide data integrity along with critical confidentiality. TrueCrypt:www.truecrypt.org/downloads.php

Also an incredible site for hardware and general computing knowledge mostly focusing on hardware performance and upgrades:
www.tomshardware.com

Enjoy!

Friday, January 16, 2009

Cyber Threats Report 2009

Industrionage ( www.industrionage.com ) information services are dedicated to providing the most current in Enterprise Data Security procedures and reports:

“The future threat goes beyond what we think of as cyber-espionage and intellectual property theft, although that certainly remains a factor,” said Heron. “I think we’re going to see more technologically savvy, state-sponsored attacks to the IT systems that support foundational services here in the U.S.”
George Heron - Founder, BlueFin Security


Learn How To Hack

Learn How To Hack

An excerpt from the annual report on emerging cyber threats according to the Georgia Institute of Technology ( www.gtisc.gatech.edu ): "Data will continue to be the primary motive behind future cyber crime—whether targeting traditional fixed computing or mobile applications. According to security expert George Heron, 'It’s all about the data,' whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. And Heron expects data to drive cyber attacks for years to come. The data motive is woven through all five emerging threat categories:"
  1. Malware
  2. Botnets
  3. Cyber warfare
  4. Threats to VoIP and mobile devices
  5. The evolving cyber crime economy
Ahead we will explore what each of these "threat categories" entail and what to look out for when securing your enterprise's data.

Friday, January 2, 2009

www.industrionage.com

I have created a web site ( www.industrionage.com ) dedicated to education, providing security services within the realm of Information Technology and to operate as a repository of resources relating to Corporate Security.

The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, "Securing Cyberspace for the 44th Presidency."

Learn How To Hack

Learn How To Hack



The Commission’s three major findings are:
Cybersecurity is now one of the major national security problems facing the United States; Decisions and actions must respect American values related to privacy and civil liberties; and Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.

What Industrionage security operatives will do for your enterprise:

We investigate computers, networks, and servers for evidence of security breaches.

We educate corporate personnel in preserving the confidentiality, integrity and accessibility of corporate information.

We will support and monitor your network/corporate data 24/7.

We will secure your data.

We will help you develop a defense in depth and layered defense corporate security plan.

  • Lock your doors. Computer passwords alone won't keep determined infiltrators from stealing.
  • Encrypt sensitive computer files.
  • Shred all paper documents before trashing them.
  • Don't discuss company secrets in unsecured environments.
  • Don't assume your consultants and temps are working on your behalf.
  • Some well-placed paranoia could save your company from financial calamity and public humiliation.