Award Winning Technology Consultants in Indianapolis Indiana.

 
Main Pg

Cyber Security

Internet Crime Prevention

 

Computer Emergency Responce Team.

 

nist.gov

 Your ALT-Text here

us-cert.gov

 
Email (Group)

Search

Abuse News

Contact Us

Links

Google
Cyber Security & Crime Information.

It is much better to be proactive than reactive!

 
 
IT Security News First:  

Currant Activity

Cyber Security can be divided into several different levels, or classifications but you first have to identify what you are worried about, is it Internal data theft, external hacking, or a combination of several. Sadly the is no one fix that does it all, but instead a multi-level plan of counter-intelligence of reverse hacking has worked for me for many years.

In my practice I have done router tricks to deflect attacks. Use "Honey Pots" to allow hackers to steal useless information and out themselves. I usually deploy a host of "retail" products that have known limits as cyber-bait, and other layers of backup security measures. I am a believer in the idea that you can not completely stop hackers, but you can stop them from acquiring your "REAL" data with a series of decoys that will lead them to your trap and getting arrested.

My Business for the past thirty years has centered around keeping businesses safe, so I have seen most every scam running on a computer. But new version and combination are coming to life every day. My point is that there no single way to protect your business. The best way is to have a network administrator watch everything that happens. The worst "scam" I have seen lately is "Managed Service Providers"

 

Common sense solutions are rarely used. Most try to sell you the glitz on the web, with very little substance. I am discussed with client's lack of ethics! "Business is business" does not excuse anything! Story coming soon.

   

 

 

 

 

I have seen this (below) first hand several times in the past year (2020). Sad how much money was wasted on pay criminals!
 

What is a reverse social engineering attack?

A reverse social engineering attack is a person-to-person attack in which an attacker convinces the target that they have a problem or might have a certain problem in the future and that the attacker, is ready to help solve the problem. Reverse social engineering is performed through the following steps:

1). An attacker first damages the target's equipment.
2). He next advertises himself as a person of authority, ably skilled in solving that problem.
3). In this step, he gains the trust of the target and obtains access to sensitive information.

If performed well enough to convince the target, the victim often calls the attacker and asks for help.

 

Here is a course on Cyber Security.

Cyber Security - Risk management course 2020
 
https://csrc.nist.gov/CSRC/media/Projects/risk-management/images-media/rmf-training/intro-course-v2_0/index.html

Cyber-Security/NIST.SP.800-37r2.pdf

hacking-tool-software


TechNet, W3C, and NSA standards are supported. https://www.cisa.gov/careers

_______________________________________________________________________________

Consulting-Information-Technologies/security/cyber_crime/NIST-8006.pdf