IT Technician – Your Ticket to a Great Career!

comptia-it-tech-blog-header

Carl Forkner, Ph.D.

Director of Training & Development

Technology devices. Across the globe, most people have one. It may be on your desk, on your lap, or in your pocket. You can use these devices for social media, taking pictures, banking, shopping, research, communicating with others, and much more. The Internet of Things, allowing you to run your security system, household appliances, and other options, once only available to the rich and famous—now it is available to the average consumer. Technology will continue to evolve—it is not going to go away.

Why is this certification so important and what can it do for you?

Continue reading “IT Technician – Your Ticket to a Great Career!”

The Cybersecurity Threat Landscape in 2016

Cybersecurity Threat Landscape

Evolving technological advances drive the change of cyber threat landscape. Devices and applications are under development and appear on the market at more rapidly—and with those new technologies come new threats.

Not only companies and organizations—but individual users using laptops, tablets, and smartphones, who are novices in information security risks—must deal with potential cyber-attacks.

“Security is a journey, not a destination.”

Symantec CISO Patricia Titus

Hidden threats from social media sites are a continuing challenge, as social media becomes the primary source of connectivity for people around the world. More cross-platform sharing and integration will continue to make device and network security an evolving challenge at all levels.

It is essential to understand the multi-axial evolution of cyber-attacks. To combat evolving threats from a network’s core to end user devices, Fortinet recommends some advice to protect valuable assets inside the network, including:

  • Identify all legal requirements facing your specific business.
  • Ensure your data is protected, segmented and monitored.
  • Review your security posture on a regular basis.

*Source: Fortinet 2016 CTAP Threat Landscape Report

Dynamic Worldwide Recommendation

To get a foot in the door of cybersecurity, you may want to know more about:

If you are experienced in computer security but want to stay ahead of the curve in cyberspace, we recommend you consider the following certification:

Application Security and Securing Social Media

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:

http://www.dwwtc.com
http://www.dwwtc.com/eccouncil/
http://www.dwwtc.com/uki/
http://www.dwwtc.com/outline/comptia/security-plus

By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)

Social Media Accounts Security Breach

News just came out today from IT NEWS concerning the social media accounts security breach on Skype’s social media accounts.  Not surprising that social media accounts are the target of hackers everywhere.  Business and personal postings provide a wealth of information and whether or not someone can get to this information depends on the strength of the security.

Dynamic Worldwide Training Consultants  www.dwwtc.com believes in security training and offers:

Get your company ready in 2014 to ward off these types of breaches.

 

Skype’s social media accounts targeted by hacker group

Jan 02, 2014 12:56 am | IDG News Service

User information was not compromised, Skype said

by John Ribeiro

 

.Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks.

“You may have noticed our social media properties were targeted today,” Skype said in a Twitter message late Wednesday. “No user info was compromised. We’re sorry for the inconvenience.”

Skype’s Twitter account, blog and Facebook page appeared to have been attacked by the SEA, a group that supports the Syrian government, according to reports. The Skype blog was still inaccessible late Wednesday and redirected users to the Skype home page.

The SEA reproduced in a Twitter message a copy of what appeared to be its message using the Skype account on Twitter. The message read: “Don’t use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.More details soon #SEA.” It did not figure by late Wednesday on Skype’s Twitter feed.

SEA later posted on Twitter contact information purportedly of Microsoft CEO Steve Ballmer, stating: You can thank Microsoft for monitoring your accounts/emails using this details.

The attack on Skype’s social media accounts appears to be linked to disclosures through newspapers by former U.S. National Security Agency contractor Edward Snowden that Internet companies allegedly provide the agency real-time access to content on their servers for surveillance purposes.

The SEA has targeted previously many high-profile websites and Twitter accounts. In August, an attack purportedly by SEA on Melbourne IT, an Australian domain registrar, affected the websites of The New York Times, Twitter and other top companies.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com