Recent Posts
Mute Your Mic
I generally try to keep my microphone off when on a meetings, partially because I never know what chaos is going to happen in my household with two kids and a dog, but as of today I have a new reason. According to some recent security research, it is possible to steal passwords and other sensitive data from a computer using just the sound of keystrokes over a Zoom call. While the hack has been theoretically possible, the latest research claims up to a 95% accuracy rate.
read more
MultiFactor Authentication (MFA)
Introduction The security of online accounts and data has become more critical than ever. Cyber-attacks are rampant and a majority, something like 90%, start with a phishing email. A good way to reduce the effectiveness of this attack vector is by using Multi-Factor Authentication, commonly referred to as MFA. This post will delve into what MFA is, why it’s crucial for online security, and how it operates.
What is MFA? Multi-Factor Authentication (MFA) is a security method that requires users to provide two or more verification factors to access a resource, such as an application, online account, or a VPN.
read more
Policy Open Sourcing
Policy Open Sourcing
Over the years, I’ve worked with multiple companies, contributing my skills, insights, and, often, writing and rewriting policies. Every new enterprise brought a fresh slate, yet I found myself revisiting familiar grounds. I realized recently that I am once again working to develop an Information Security program, in line with multiple industry and regulatory frameworks. The last few times I have been building an information security program in line with FFIEC, ISO 27001, and NIST 800-53.
read more