BrainWave Consulting Company, LLC
  • Home
  • About
  • Services
  • Free Utilities
  • Blog
  • Contact
Select Page
FileHash: The Quick and Dirty File Integrity Checker

FileHash: The Quick and Dirty File Integrity Checker

by Andrew S. Baker | Jul 12, 2020 | Compliance, IT Operations, Scripting and Automation, Security, Software

Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
Learning Lessons from the Avast Breach

Learning Lessons from the Avast Breach

by Andrew S. Baker | Oct 27, 2019 | IT Operations, Risk Management, Security

Those who fail to learn the lessons of history are destined to repeat them.  Don’t be that organization…  Back in September of 2017, Avast indicated that the network of its recently acquired (July 2017) subsidiary had been infiltrated, and  that its CCleaner...
Spy vs Spy: Key Lessons for Businesses about Cybersecurity

Spy vs Spy: Key Lessons for Businesses about Cybersecurity

by Andrew S. Baker | Oct 1, 2019 | Data Privacy, Government, Policies and Procedures, Risk Management, Security, Strategy, Technology

A few weeks ago, I read an article that provided significant insight into the Spy vs Spy battles between the Unites States and Russia. Title: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil It was...
To Infinity and Beyond

To Infinity and Beyond

by Andrew S. Baker | Aug 20, 2019 | Government, Policies and Procedures, Risk Management, Security, Technology

Ransomware is skyrocketing – but we really shouldn’t be surprised.  In fact, many in the cybersecurity community saw it coming. To set the tone for what I’m talking about, here are just a few of the recent headlines pertaining to ransomware:  ...
Are breaches really inevitable?

Are breaches really inevitable?

by Andrew S. Baker | Aug 2, 2019 | Compliance, Data Privacy, Security, Strategy

Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence?  Is it so because it is oft repeated? Inevitably, we are...
On Vulnerabilities and Reporting

On Vulnerabilities and Reporting

by Andrew S. Baker | Jul 29, 2019 | Data Privacy, Risk Management, Security, Technology

This past week I read a pretty interesting article, posted on SiliconANGLE, about vulnerabilities found in cloud applications. It had the unfortunate title of: Report finds 34M vulnerabilities across AWS, Google Cloud and Azure This was compounded by the lead off...
« Older Entries
Next Entries »

Search Posts

Recent Posts

  • Increased Vigilance is Strongly Recommended
  • Protecting and Recovering Your Social Media Accounts
  • CyberSecurity 102 for Small Businesses
  • CyberSecurity 101 for Small Businesses
  • Yes, You Need to Understand Technology Architecture
  • Preparing for 2021

Archives

Categories

  • Business Management (4)
  • Career Management (6)
  • Compliance (10)
  • Corporate Culture (7)
  • Data Privacy (15)
  • Government (3)
  • Hardware (6)
  • Humor (1)
  • IT Operations (10)
  • Lead Generation (1)
  • Multifactor Authentication (2)
  • Personal (4)
  • Policies and Procedures (10)
  • Risk Management (22)
  • Sales and Marketing (1)
  • Scripting and Automation (3)
  • Security (35)
  • Software (13)
  • Strategy (27)
  • Technology (41)

Tags

Breach Breach Notification Business BYOD Career Cloud Computing Compliance Cybersecurity Data Privacy Deployments Governance Identity Theft Incident Response Information Security Information Technology Infrastructure Integration Investments IT Operations Job Market Leadership Malware Management Mobile Computing News Password Management Personal Policies Professional Networking Project Management Rants Resources Risk Assessment Risk Management Risk Mitigation Security Shell Scripting Social Media Software Staffing Strategy Technology Utilities Vulnerabilities Webinar
  • Home
  • About
  • Services
  • Free Utilities
  • Contact
  • Facebook
  • Twitter
© 2023 BrainWave Consulting Company, LLC - All Rights Reserved | Website designed by Spencer Taylor