Tech Tidbit – Hacker’s Bag of Magic Tricks – Clean IPs

“Reality is merely an illusion, albeit a very persistent one.” -Albert Einstein “You live in a world of illusion Where everything’s peaches and cream. We all face a scarlet conclusion, But we spend our time in a dream.” -Jungle Love, Steve Miller Band Ignorance is not bliss when it comes to network security.

Read more

Do You Have the Armor you Need?

Today’s cyber landscape feels a lot like this picture. Anyone who uses a device connected to the internet is under threat. You never know when that arrow with your name will find you. Do you have the armor you need to give you the best chance of survival when the arrow finds you? Medieval warriors […]

Read more

Tech Tidbit – A Different Take on Worldwide Backup Awareness Day

I read the other day that today is “Worldwide Backup Awareness Day.” I have no idea who declares these days. I am guessing you already know you should have good backups and air-gapped backups. However, I am taking the liberty of morphing this into more sophisticated forms of backups.

Read more

Tech Tidbit – Scott’s Top 5 List to Up Your Cyber Defenses

Here is my “Top 5” list to up your cybersecurity defenses: Make sure that whatever your current endpoint protection strategy is, it is 100% in place. There are always better tools. However, repeatedly, the attackers are exploiting gaps in your cyber defenses.

Read more

Tech Tidbit – Welcome Back!

Welcome back! This summer flew by, and my summer vacation seems like a distant memory. In my 44 years of helping schools open for the new school year, this one was different. Several districts suspended all major work the last week of August. This was a summer of busy projects.

Read more

Tech Tidbit – Second Opinions

A year ago, my very short wife sat in a restaurant during March Madness on a bar stool that was too tall for her. The result was that while getting down off the stool, she blew out a disk in her back and was in tremendous pain. We went to a local ortho walk-in clinic.

Read more

Tech Tidbit – You cannot respond to what you cannot see – Visibility

You already know that “all” in security protection is vitally important. You need all your endpoints and servers protected with something. Hopefully, that something is EDR, MDR, and XDR products like CSI’s CSEDR powered by SentinelOne, CSMDR powered by Blackpoint plus SentinelOne, or CSI’s Managed XDR service powered by BlueShift Cybersecurity.

Read more

Tech Tidbit – Thoughts About The AT&T Breach

You have probably heard of the AT&T breach by now. Reports describe it as the largest breach in history with serious national security consequences. AT&T has reported that threat actors stole all client call and text records for six months. I have not read anything indicating that the threat actors know the contents of any […]

Read more

Tech Tidbit – Who Do You Trust?

“Trust but verify.” -President Ronald Reagan, December 8th, 1987, at the Intermediate-Range Nuclear Forces (INF) Treaty Signing I watched a presentation the other day by the head of Threat Operations for a major Security Operations Center (SOC) that provides 24/7 security oversight over networks like yours.

Read more