Entries by Paul Hill

Tips to Prevent Online Identity Theft

There are few new trends in online identity theft, although some attacks are becoming more sophisticated, the basic steps to prevent exploits remains the same. Be on the lookout for attacks that use broken English in the message body. While most now use proper English and use the same style and logos that are used […]

Network Access Control (NAC)

Controlling access to the network is fundamental security control. For shared networks, the capability of users to connect to the network should be restricted. Well known security frameworks such as ISO 27002, Information technology – Security techniques – Code of practice for information security management, includes this control as a recommendation. And the Payment Card […]

Impact of a Data Breach on a Small Business

While our main focus is as a provider of IT compliance and security consulting services, we have been called in to help a few small businesses handle security incidents and data breaches. These calls come to us after the client has discovered there’s been a security incident or data breach and as a result is […]

Cybersecurity Responsibilities for SMBs

Cybersecurity is a topic that many small and most medium-sized businesses care about due to all of the news stories about data breaches, identity theft, and ransomware that have appeared in the last several years.  Some small and medium-sized businesses have realized that having a strong cybersecurity program can be a strategic asset for their […]

Encryption Implementation: Is It the Cure-all for Cybersecurity Woes?

Based on the science of cryptography, encryption is the process of coding and decoding messages to keep them secure, and is often touted as the silver bullet for cybersecurity woes. But is it really the cure-all? The classic model of information security starts with the triad of Confidentiality, Integrity, and Availability. Cryptography is critical to providing confidentiality […]

Windows Hello Biometrics: how well do the security options work, what to look out for and when are they appropriate

Many security pundits have been saying passwords must go for years, and biometrics are an alternative to passwords, but not all security professionals believe biometrics are the best alternative to passwords. Microsoft Windows 10 provides native support of biometric authentication and as result many people are  making a new look at the viability of biometric authentication. Windows […]