Blog Posts - Cyber Security

3 Tips for Corporate Battle Plans against Cyber-Attacks

There are some things that can really ruin your day, like spilling a drink on yourself, or having your entire corporate network compromised by a crime syndicate. One of those might be a mildly bigger deal than the other. But let’s talk about the le...
by CAI University on Dec 9, 2016

Pluralsight – Cyber Security Awareness The Importance of Identity Protection

Cyber Security Awareness: The Importance of Identity Protection Are you a modern-day internet user who is concerned about protecting your identity? If so, then this course in the cyber security awareness series by MentorSource, The Importance of Iden...
by Tutorials For Download on Dec 4, 2016

Blue Pillar Aurora 5.0 Platform

The updated Aurora 5.0 platform has expanded capabilities for organizations that rely on critical infrastructure be more productive and energy efficient. Read Blue Pillar Aurora 5.0 Platform on Facility Executive - Creating Intelligent Buildings.
by FacilityBlog on Jun 29, 2016

FBI NEWS - Ransomware

"Incidents of Ransomware on the Rise" FBI News 4/29/2016Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an i...
by Mage Soapbox on May 2, 2016

SECURITY - eMail Domains

Just have to comment on paying attention to the domains you receive eMail from.Got an eMail reminding me 'to confirm your account' on a site I never heard of.The domain was ""!Ya, like that's a safe site, .....NOT.You need to pay...
by Mage Soapbox on Apr 29, 2016

THE TAX MAN - IRS Commissioner

"IRS commissioner:  Funding cuts hinder security, efficiency" PBS NewsHour 4/18/2016Congress, hint, YOU HAVE TO FUND upgrades for cyber security.ExcerptsSUMMARY:  The IRS is facing tougher scrutiny than ever from Congress.  Last week,...
by Mage Soapbox on Apr 25, 2016

Survey: What Is Your Cyber Security Role?

As part of a research partnership, this survey asks facility managers, commissioning and other consultants, and IT personnel to weigh in on cyber security for facilities. Read Survey: What Is Your Cyber Security Role? on Facility Executive - Creating...
by FacilityBlog on Mar 15, 2016

DATA SECURITY - Ransom of LA Hospital

"Ransomware attack takes down LA hospital for hours" PBS NewsHour 2/29/2016This highlights the need to use good Anti-Virus utility AND do an image backup your entire system AFTER running a virus scan (the only backup you can use to recover your entir...
by Mage Soapbox on Mar 7, 2016

Facility Executive | January / February 2016 Issue

This issue announces our 2016 Facility Executive of the Year, and the popular Readers' Choice Awards. Plus a look at cyber security, cleaning performance assessments, roofing insulation and systems, HVAC maintenance, and renewable energy initiatives.
by FacilityBlog on Feb 18, 2016

Security Jobs: Cybersecurity Engineer / Evangelist, Build a Program, Arlington, TX, Great Relocation Package

Cybersecurity Engineer / Evangelist, Build a ProgramLocation: TX - ArlingtonCompensation: Mid $100sRelocation Package: YesJob Type: Full-TimeRequired Education: BA/BS Preferred but not requiredCertification: CISSP PreferredThe RoleEvery once in a whi...

L’impronta digitale del premier

Anna Lombroso per il Simplicissimus L’abbiamo visto inorgoglirsi per l’omaggio canoro di bimbette a scuola, compiacersi per gli auguri cantati dalla Puppato nelle vesti di Marylin, l’abbiamo visto infliggersi una secchiata d’acqua pur di riba...
by Il Simplicissimus on Jan 18, 2016

Identify Fake Facebook accounts with these simple tricks

Facebook is the largest social network in the world. It has 3.5 billion users all over the world. Some uses Facebook to make new friends where as some use it to do scam and potentially illegal activities. Making a fake Facebook account has became ten...
by TechTechnik on Jan 12, 2016

Cybersecurity News and Cybersecurity Education for the Week of January 10, 2016

CYBERSECURITY NEWSOF THE WEEK FROM OUR FRIENDS AT CITADEL INFORMATION GROUPCyber CrimeAccount Takeovers Fueling ‘Warranty Fraud’: Cybercrime takes many forms, but one of the more insidious and perhaps less obvious manifestations is warr...

Are Utilities In The US Ready For Cyber Attacks?

More often than not, it is necessary for me to let the information that comes to me rest for period of time before I can write about it.  In this case, I’m sharing real examples that are now two years old.On Monday, on my

Java Plugin Malware Alert to be issued by Oracle

Oracle is widely known for being behind the popular programming language called Java. Java is used for variety of purposes by the developer from making apps, games to even other robust programs.... [[ This is a content summary only. Visit my website...
by Mono-live on Dec 28, 2015

Crack WiFi Password with Backtrack 5 ( WiFi password hacker)

Hacking a WiFi network with Backtrack is quite simple all you have to do is enter certain commands and you are done..In one of my previous post i told you how you can hack and Crack WiFi Password using hydra. Keep in mind that in order to Crack...
by TechTechnik on Dec 16, 2015

Moonfruit takes Websites Offline after Cyber-Attack Threat

Cyber attacks have been increased rapidly throughout the globe. Sony was hacked just a few months which caused leakage of emails, movies details and other. Snapchat has also been hit in the past and... [[ This is a content summary only. Visit my web...
by Mono-live on Dec 16, 2015

Build a Cyber Security Program, Individual Contributor, Dallas, TX Region, Strong Relocation, Mid $100s Compensation

Build a Cyber Security Program (Individual Contributor w/ Authority)Location: TX-Dallas RegionCompensation: Mid $100sRelocation: YesClearance: Active DoD Secret ClearanceCertification: Security+ or CISSPEvery once in a while a true Career Opport...

Can a Conversation Focused on a New Hire be Stimulating?

You bet it can!Companies call me all the time looking for recruiting assistance.  I’ve done this work long enough to have a good sense as to when a recruiting relationship will work and when it may not work so well.I’ll save those indicators...

Top 5 Best Cyber Security Tips for Businesses

The internet, a variety of apps and the availability of cloud computing has made it possible for any business to be looked after from anywhere on the planet. Your geographic location is no longer... [ Continue reading full article at

Trending Topics