Upcoming Training Events at DWWTC

events-wide

About once a month we like to hold a free training events. These events are always free, typically include snacks, and are usually streamed to the web for remote viewing. The list of events keeps growing as you can see in the list below. Join us and see what DWWTC has to offer.

First Look: Digital Marketing with Social Media – Aug 21, 2014
Microsoft Tech Showcase: Windows Server 2012 R2 – First Look – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Exchange Server 2013 – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Windows Azure – Oct 2, 2014
Microsoft Tech Showcase: Microsoft Office365 – Oct 2, 2014
Microsoft Tech Showcase: SQL Server 2014 – November 25, 2014

This month we are offering a First Look event for our newly revised Digital Marketing with Social Media first look event. With this First Look, we hope to offer insight to the value of social media and how to engage your audience with tools like twitter, linked-in, facebook and more. Join us, August 21st for an event to help your business grow in today’s social market.

Application Security and Securing Social Media

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:

http://www.dwwtc.com
http://www.dwwtc.com/eccouncil/
http://www.dwwtc.com/uki/
http://www.dwwtc.com/outline/comptia/security-plus

By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)

Social Media Accounts Security Breach

News just came out today from IT NEWS concerning the social media accounts security breach on Skype’s social media accounts.  Not surprising that social media accounts are the target of hackers everywhere.  Business and personal postings provide a wealth of information and whether or not someone can get to this information depends on the strength of the security.

Dynamic Worldwide Training Consultants  www.dwwtc.com believes in security training and offers:

Get your company ready in 2014 to ward off these types of breaches.

 

Skype’s social media accounts targeted by hacker group

Jan 02, 2014 12:56 am | IDG News Service

User information was not compromised, Skype said

by John Ribeiro

 

.Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks.

“You may have noticed our social media properties were targeted today,” Skype said in a Twitter message late Wednesday. “No user info was compromised. We’re sorry for the inconvenience.”

Skype’s Twitter account, blog and Facebook page appeared to have been attacked by the SEA, a group that supports the Syrian government, according to reports. The Skype blog was still inaccessible late Wednesday and redirected users to the Skype home page.

The SEA reproduced in a Twitter message a copy of what appeared to be its message using the Skype account on Twitter. The message read: “Don’t use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.More details soon #SEA.” It did not figure by late Wednesday on Skype’s Twitter feed.

SEA later posted on Twitter contact information purportedly of Microsoft CEO Steve Ballmer, stating: You can thank Microsoft for monitoring your accounts/emails using this details.

The attack on Skype’s social media accounts appears to be linked to disclosures through newspapers by former U.S. National Security Agency contractor Edward Snowden that Internet companies allegedly provide the agency real-time access to content on their servers for surveillance purposes.

The SEA has targeted previously many high-profile websites and Twitter accounts. In August, an attack purportedly by SEA on Melbourne IT, an Australian domain registrar, affected the websites of The New York Times, Twitter and other top companies.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com

Top 3 Reasons to Become Social Media Security Professional Certified

Meeting the Challenge to safeguard social media.

The role of Social Media Security Professional Certification is becoming increasingly important. Qualified, certified personnel are going to be necessary for social media protection.  UKI in partnership with Dynamic Worldwide Training Consultants offers a Social Media Security Professional certification powered by CompTIA. Why is this necessary?  Here are the top 3 reasons to become Social Media Security Professional certified:

1. Studies by Norton, Sourcefire, McAfee and Forrester named social media security among the top three biggest challenges for the information assurance industry in 2013.

2.  Protiviti “2013 Internal Audit Capabilities and Needs Survey Report” of more than 1,000 internal auditors revealed the 43% of respondents’ organizations have no social media policy and those that do, often fail to address basic security issues.

3. According to the “2013 IT Priorities Survey” by Protivity, CIOs view improved competency in social media security as one of the most pressing concerns as social media becomes more and more mainstream.

http://www.dwwtc.com/uki/

Social Media Attacks: The Pretty Face that Invaded a Government Agency through Social Media and How to Avoid Falling into the Same Trap

by Dr. Scott A. Wells and Justyna La Pay, Ultimate Knowledge Institute

As we just learned from Cyberdefense specialist Aamir Lakhani, Robin Sage social media attacks are alive and well. By creating a fake social media account under the name “Emily Williams” and tricking government personnel into accepting his requests, Lakhani, a penetration tester for World Wide Technology, gained access to passwords, sensitive documents, and even the computer of the head of information security at an unnamed government agency. It took only 15 hours for Lakhani to gain over 55 connections to his targets via Facebook and Linkedin. After a short time, male employees offered to help “Emily” get a laptop, and, most surprisingly, offered her a job and gave her early access to their network. Read more about this penetration testing attack.

Insidious, simple social media attacks that rely on penetrating social networks aren’t new, either. In 2009, security specialist Thomas Ryan tricked hundreds of defense specialists into giving him sensitive information by crafting the fake online persona “Robin Sage.”

One would think that national security professionals would be more careful about who they allow into their social networks. This latest example shows how vulnerable our data networks are to these types of attacks, and underscores the value of comprehensive cyber security training programs.

Here are three ways to prepare your organization against attacks like these:
1) Avoid allowing unknown people into your social network.

Often users tend to spend too little effort to ensure that the friendship requests are from actual friends. It’s been shown that 78 percent of all Facebook users use the number of friends they have in common with their current friends as the most compelling reason to accept an incoming friendship requests.

Google Image search can be used to help validate unknown social media requests.

We all know about Google Images, but do we all know about Google’s reverse image search engine? It’s a service that allows users to search by images. No, that isn’t search for images per se — it is search by images: you input an image URL or upload an image, and then Google finds similar looking images. Although the service may sound simple, it can be very useful.

Let’s say you have a profile picture of a person and you want to verify that they are who they claim to be.  Simply copy their picture to your desktop, drag it into the Google Image search field and there you go.  It either verifies their identity or you may find yourself in the middle of a catfish attack. A catfish attack is when an individual pretends to be someone they’re not, like in the case of “Emily Williams”. We can use Google Image search as a quick counter measure to those attacks. It is a great tool for confirming someone’s identity on Facebook, LinkedIn, Social Dating sites,  and any other venue in which a friendship is established based on a profile.

URL: http://images.google.com
Use: Google Chrome or Firefox Browser

2) A social media network is only as strong as its weakest link.

Be aware of connections in your network that may be compromised – even real associates or friends may be allowing bad actors in their network to view your data. If your friend hasn’t checked the authenticity of the friend request prior to accepting it and you’re approached by the same person, you may be dealing with a hacker.

3) Stress the importance of social media security awareness.

There are few technologies out there that will protect you from threats coming through social media. User security training is the best way to fend off attacks. Everyone can fall prey to social media attacks, even the very cyber security-savvy professional as evidenced by Lahkani’s research.

Learn more about Social Media Security Professional (SMSP) certification powered by CompTIA

http://www.dwwtc.com/outline/uki/social-media-security-professional

About Scott A. Wells, Ph.D.

Co-Founder / Director of Training,  Ultimate Knowledge Institute (UKI) | Chief Architect of the Social Media Security Professional (SMSP) Certification Powered by CompTIA

Dr. Scott Wells is recognized throughout the industry as a world-renowned instructor and consultant known for his commanding presence in the classroom and breadth of knowledge in the world of Information Technology and Information Security. Dr. Wells achieved his doctorate in Applied Mathematics (Cryptology) and has worked for and consulted industry leading corporations such as Microsoft, Digital, and Cisco as well many other Fortune 100 companies. For the past 12 years Dr. Wells has developed and taught hundreds of Information Technology and Cybersecurity training programs for the Department of Defense, Federal Agencies and Fortune 500 enterprises.

Dr. Wells leads the initiative to establish Ultimate Knowledge Institute as the industry leader in providing Social Media Security, Forensics, and Governance training as well as a renowned certification body awarding cybersecurity experts with the Social Media Security Professional (SMSP) Powered by CompTIAcertification, the Social Media Engineering & Forensics (SMEFP) and Social Media Management & Governance (SMMGP) certification.

Energy Vampires are on the loose.

file00042158605

Happy Halloween…. At DWWTC, we are having a “Come and Share a Bite” Vampire lunch so it really puts us in the mood!

We are on the downhill slide into the ending of 2013 and if you are in business, you are getting recharged for 2014. Pace picks up because it is very busy at work and the planning for all the holidays in the next few months makes it hectic at home. “Beware”, with everything that is going on, it seems the energy “vampires” are on the loose.

Energy Vampires can be labeled as anything that “sucks” the life right out of you. “Storybook” vampires drain the soul by depleting the blood but “real” vampires drain your spirit by depleting your positive energy.

Has stress, drama, negativity, guilt, unmet deadlines, inner conflict (mixed feelings about something), worrying about “stuff” to name a few things, made you feel tired, listless, stalled out, and not as productive as you would like? These are energy vampires at work. They alter your work and life balance and send you retreating into “dark shadows”. This is not the best place to be this time of year with so many expectations and so many things to enjoy for the memories they will create.

The best way to fight energy vampires is with garlic so let’s take a look at the power of this item.

G: GROUND yourself. This is perfect to do first thing in the morning before all the have to’s and the must do’s “creep” into your mind and heart. Close your eyes, focus on you and your breathing. Be thankful for what you have and what you can offer to someone else. Whenever possible: GO outside and walk and GO to the water (ocean, lake, river, bath, or shower). It is amazing what nature and water will do for your spirit.

A: You have heard the saying that ATTITUDE is everything and that the power of the mind is your best defense against the negative drains. Stay positive.

R: READJUST your thinking. Be the person who brings unexpected lightness and comfort to others and in return there will be more lightness and comfort brought to you. It is no longer about what is happening to you but what you can make happen for others.

L: LEARN to plan your activities to prevent running late, not meeting deadlines etc which are the things that cause stress. LEARN to LISTEN to your body. If you feel your heart racing and your stomach is in knots or you have an unsettling feeling, then take the time to change your focus. Energy goes where attention flows. Sometimes situations correct themselves or answers flow more freely if we can walk away from it for a few moments. Most of all: LAUGH, LOVE and enjoy LIFE.

I: Take an INVENTORY of the people you surround yourself with. Who are the energy providers and the energy drainers? INVESTIGATE what it would take to turn situations around to be pleasant experiences and less stressful. It is important to remember we are people of positive INDIVIDUAL power.

C: Understand that life is all about CHOICES. We CHOOSE to stay or walk away from what is draining us. If you feel your energy being sucked out, don’t hesitate to politely remove yourself from the situation for a few moments of breathing room. Those few moments can make all the difference. It helps you to read-just your feelings.

If you want to be an energy magnet, research shows that you need to pay attention to your heart. The heart acts as an emotional conductor and radiates how you are feeling to every cell in the body via the heart’s electromagnetic field; this energy field can be detected up to 5-10 feet away and is 5,000 times more powerful than the brain.

With your heart and your spirit protected by GARLIC, these vampires will have nowhere to go but away from you.

From the DNA of Six Sigma: The Great Discovery

file6931245178661

Make the Great Discovery and achieve breakthrough
performance in everything you do.

• Research-based and proven over two decades
• A time-tested repeatable and teachable way of reasoning
• Can be implemented by nearly anyone, at any education or experience level
• Greatly increase the odds of success for achieving breakthrough
• A way of thinking that leads to improvements based on the laws of science, not
Superstition or intuition
• Allows the ordinary to reach out and achieve the extraordinary
• A way of thinking that guides individuals and work teams to courageous results
From the co-creator of Six Sigma

Dr. Mikel J. Harry, has synthesized the key lessons learned in practicing Six Sigma
over the past two decades and is revealing the common thread that can lead to
break through success for any person or work team. He calls it The Great Discovery.
It is the essence of what is required to create breakthrough. But it has been taken
out of the world of upper management and can now be applied in any area of life
for any individual or work team.

Dr.  Mikel J. Harry, Co-creator of Six Sigma and National Best-Selling Author.

“The Six Sigma Way Of Thinking (SWOT) has made
outstanding improvements at large corporations
– I want to show you how it can be applied in
your work life, practiced in your personal life and
adapted to your home life.”
A Proven Path to a higher quality life……for your personal life, home life and work life.

See a free preview of this course offered in partnership with Dynamic Worldwide Training Consultants on August 22, 2013 from 9 am to 12 pm. Register and tell your friends to register:
http://eventbrite.com/event/7776681263

Locking Down Social Media

Ultimate Knowledge Institute is our learning partner who is responsible for the Social Media Security Professional course. UKi has developed course materials for Cyber Security training and offering consulting services to the Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies (they know what they are talking about).

UKi is currently offering a free webinar for Locking Down Social Media – Next Generation Security Enhancements. If you manage social media for your company, manage security, or just want to know more about the current state of security in social media, register to save your spot today!

TIHWDIH–Perception by Punctuation

Every business and organization should make a determination early on as to how they want to be perceived in the marketplace.

1. What are the core  business values?
2. What are the mission and vision statements?
3. How will clients be engaged? Are promises kept?
4. What does the ultimate customer experience look like? Are customers happy? Were expectations exceeded?
5. Are a proven set of processes in place?
6. Have customers received more value than the money they spent?


It really doesn’t matter what type of business it is, these should form the basis of TIHWDIH (This is how we do it here).
I first read about this concept in John Jantsch’s book “The Referral Engine”, which was tremendously educational on the subject of businesses marketing themselves. I was already sold on him and his writing anyway from his “Duct Tape Marketing”. With highlighter in hand and stapled pages to the front of the book, I copied down websites to visit, books to read, ideas to try, and tools to use. I will get back to the point of this blog but I wanted to make sure that the reader knows that there is so much to learn from this book.


So how does the perception of TIHWDIH change simply with punctuation and why include this type of blog on a technical training website? We are a business who wishes to live by this principle just like other business should. We are committed to a system of processes that orients our new customers, delivers the product (training) and makes certain our client is happy.


Let’s look at this as three different statements.


TIHWDIH. (period) This means this is how we do it here PERIOD. No if’s, and’s, or but’s. It’s a statement that says that we are a business you can count on, we deliver on our promises, exceed expectations, deliver value, and give a customer experience worth praising and referring. PERIOD.


TIHWDIH? (who, what, where, when, and how)Clients have questions that need accurate and timely answers. Ensure that everyone in your organization is delivering the same message. Knowing the answers and relaying how all systems are going to work mean that the question mark won’t be the question in their mind about whether or not they trusted the wrong company with their business.


TIHWDIH! (the wow, the secret sauce) This is how we do it here and how! Great flourishes, surprises, awesome service, and all the incredible and then somes that make customers come back over and over without a doubt! The processes are in place and running smoothly and everyone’s on the same page.

Enhanced by Zemanta

ABC’s of Championship Thinking in the Workplace

Closeup of message stones on white background.

A — Avoid assumptions, have an amazing attitude. Show appreciation for the people you work with on a regular basis.
B — Be yourself. Do not be the imitation of someone else.
C — Clarify your wishes, deliver clear, concise communication, commit to your growth
D — Design and Delight in your Destiny, be determined, use due diligence to get all the facts
E — Educate yourself, give no “excuses”
F — Face your fears, Focus on your future, Forgive
G — Adopt a “Good to Great” philosophy, Goals should be twofold: DO goals that will change and BE goals that will remain timeless since these are heart and soul goals. Businesses have DO and BE goals and we should have DO and BE goals as well.
H — stay Healthy by developing a good wellness plan
I — Inspire, improve, become interdependent by helping others grow by releasing the control brought on by independence.
J — “Jump” at the challenges offered. Here is a saying of some advice given to young American Indians at the moment of their initiation.
“As you go the way of life, you will see a great chasm. JUMP it is not as wide as you think.”
K — Become a “key” employee. Remember the story of “Karate Kid” and how Miyagi portrays Karate as the challenge on taking yourself on from beginning to end, top to bottom, to rethink every aspect of you, and that Karate is not just a form of protection. He had to find out Daniel’s commitment level with a series of tasks including the famous wax on, wax off. No matter what we chose to do, Karate Kid Kommitment (pardon the use of the K, kouldn’t help it) means not walking down the middle of the road. Commitment is either yes you do it or no, you do not but there isn’t any guess so about it.
L & M — This is the LESS of and MORE of: Less negative energy, more positive energy, Less talking, more listening, Less individual, more team.
N — Networks. Highly effective people work in networks, relying on the right people for the right reasons at the right times. We are innately social people so networking is right up our alley.
O — Overcome obstacles. It takes extra effort to be “outstanding”.
P — Be professional, persist over problems, there is power in positive interactions. Research has found that marriages are much more likely to succeed when the couple experiences a 5 to 1 ratio of positive to negative interactions. Additional research also shows that workgroups with positive to negative interaction ratios greater than 3 to 1 are significantly more productive than teams that do not reach this ratio. So what does this mean for you and me? For most of us it means we need to increase the number of positive interactions we have at home and at work and reduce our negative interactions. We need to engage each other with more smiles, kind words, encouragement, gratitude, meaningful conversations, honest dialogues and sincere positive interactions. And to foster these actions we need to create personal and team rituals that help us interact more positively. If we make them part of our organizational process and individual habits they are more likely to happen.
Q — Be a person of Quality.
R — Risk, it is worth it!! Understand that life and decisions carry some measure of risk with it but without moving ahead, we run the risk of standing still.
S — “Solve” the problem, find the “Solution”. Solutions are always out there.
T — Try, try, try….Be truthful.
U — Be Un-equal. We can decide to be average and equal or become above average and unequal.
Enhanced by Zemanta