Dude, where’s my car? Vehicle hacking trends & analysis – #7 in the series

Disclaimer. The disclaimer from the 1st in the series completely applies to this and all further additions to the series of articles. Hardware Attack-Dongle Third parties are reviewing their options as to different manners to market their services to vehicle owners. One...  [Read More]

8 Tips for Small Businesses after a Data Breach

Once you receive that dreaded call that your business network has been attacked by a cyber-criminal, you will need to take swift action. Here are eight tips to consider for your business, to reduce the impact: Don’t turn off your computers or...  [Read More]

Dude, where’s my car? Vehicle hacking trends & analysis – Part 6 in a series

Disclaimer. The disclaimer from the 1st in the series completely applies to this and all further additions to the series of articles. Attacks The vehicle seemingly on a cursory review from the layperson is a mostly mechanical piece of equipment. The person...  [Read More]

Show me the money! The New Big Business of Vehicle Cybersecurity

Vehicles were predominantly standardized for decades. These mechanized pieces of equipment were limited in design with the focus being on the engine, brakes, and other performance related physical areas of the vehicle. As time passed, the engineers became more creative as mechanical...  [Read More]

RSA reveals many incident response plans are ‘nonexistent’

Two critical aspects of cybersecurity that warrant immediate attention are the lack of risk understanding and assessment and the absence of preventative action taken. Businesses are at risk – and they know it. The problem is that, as the amount and severity...  [Read More]

R.I.S.E. Webinar: Data Breach and Planning Continuity

The Data Breach Planning & Business Continuity webinar will examine the costs of a data breach occurring, continuity planning, and an action plan for cyber attack response before, during, and after an incident. This webinar is the seventh in a series of...  [Read More]

New Pathway Scholarship Program in Cybersecurity at Excelsior College

One of the many valuable supports provided by Excelsior College is their numerous scholarship offerings. Submitting applications for every scholarship available is a wise strategy for any student seeking to reduce their educational costs. – Terry M Evans Excelsior College Alum and...  [Read More]

Future Vehicle Security

In the 1980’s and early 1990’s, carjackings were unfortunately rampant. Not a day would go by when, depending on your geographic location, when there would not be a carjacking. As this was a physical attack, the aggressor would have to be reasonably...  [Read More]

Cybersecurity Event Recovery Planning Needed by Small Businesses

Data breaches continue to occur at a rate faster than previous years. One study, by Identify Theft Resource Center, reports that data breaches are up 24% through May, 2016, over the same period last year.  Cyber criminals are increasingly targeting people through...  [Read More]

Dude, where’s my car? Vehicle hacking trends and analysis – Part 5

Automakers should work with hackers US and foreign automakers have two primary options for obtaining data and insight into securing the digital systems of their vehicles. These are the workers of the respective automaker and third parties outside of the manufacturer. The...  [Read More]