BrainWave Consulting Company, LLC
  • Home
  • About
  • Services
  • Free Utilities
  • Blog
  • Contact
Select Page
Protecting and Recovering Your Social Media Accounts

Protecting and Recovering Your Social Media Accounts

by Andrew S. Baker | Nov 1, 2021 | Data Privacy, Hardware, Multifactor Authentication, Personal, Security, Software, Strategy

The number of cybersecurity attacks against social media accounts is rapidly increasing, and attackers are often successful in preventing recovery of the accounts, resulting in victims having to totally abandon their former accounts. Here are some steps that should be...
Yes, You Need to Understand Technology Architecture

Yes, You Need to Understand Technology Architecture

by Andrew S. Baker | Jan 12, 2021 | Business Management, Compliance, Data Privacy, Risk Management, Technology

Yes, you need to understand technology and cybersecurity architecture.  No, it doesn’t matter what your business is about – you need to understand this if you want your business to succeed. No, it’s not “fair”.  No, there’s not enough time in a day. ...
FileHash: The Quick and Dirty File Integrity Checker

FileHash: The Quick and Dirty File Integrity Checker

by Andrew S. Baker | Jul 12, 2020 | Compliance, IT Operations, Scripting and Automation, Security, Software

Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
Reading Between the Lines of Breach Notifications

Reading Between the Lines of Breach Notifications

by Andrew S. Baker | Jan 18, 2013 | Compliance, Data Privacy, Security

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something...
Get Real with Information Security

Get Real with Information Security

by Andrew S. Baker | Dec 31, 2012 | Risk Management, Technology

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
« Older Entries

Search Posts

Recent Posts

  • Increased Vigilance is Strongly Recommended
  • Protecting and Recovering Your Social Media Accounts
  • CyberSecurity 102 for Small Businesses
  • CyberSecurity 101 for Small Businesses
  • Yes, You Need to Understand Technology Architecture
  • Preparing for 2021

Archives

Categories

  • Business Management (4)
  • Career Management (6)
  • Compliance (10)
  • Corporate Culture (7)
  • Data Privacy (15)
  • Government (3)
  • Hardware (6)
  • Humor (1)
  • IT Operations (10)
  • Lead Generation (1)
  • Multifactor Authentication (2)
  • Personal (4)
  • Policies and Procedures (10)
  • Risk Management (22)
  • Sales and Marketing (1)
  • Scripting and Automation (3)
  • Security (35)
  • Software (13)
  • Strategy (27)
  • Technology (41)

Tags

Breach Breach Notification Business BYOD Career Cloud Computing Compliance Cybersecurity Data Privacy Deployments Governance Identity Theft Incident Response Information Security Information Technology Infrastructure Integration Investments IT Operations Job Market Leadership Malware Management Mobile Computing News Password Management Personal Policies Professional Networking Project Management Rants Resources Risk Assessment Risk Management Risk Mitigation Security Shell Scripting Social Media Software Staffing Strategy Technology Utilities Vulnerabilities Webinar
  • Home
  • About
  • Services
  • Free Utilities
  • Contact
  • Facebook
  • Twitter
© 2023 BrainWave Consulting Company, LLC - All Rights Reserved | Website designed by Spencer Taylor