15 Dec 2014 | James Michael Stewart
A Look Back at 2014 Security Breaches

This year has been a rocky year for computer security. There have been many large personal data breaches, including those of Sony, eBay, Michaels, Spec’s, Home Depot, Staples, Kmart, Dairy Queen, MBIA Inc., Jimmy John’s, Goodwill, P.F. Chang’s, California Department of Motor Vehicles, Sally Beauty Supply, and others. Many of these breaches took place over months or years but were revealed or uncovered (or admitted) in 2014.

Read the full story »
17 Dec 2014 | Toby Skandier | A+, Certification, CompTIA
A+ Question of the Week: Fire Extinguishers

Which class of fire extinguisher should be kept on hand for possible electrical fires that might be caused by a short in the power supply?

continue
16 Dec 2014 | David Willson | Hacking & Cybercrime, Malware, Security
The Art of Deception: Stories of How We All Get Phished

Are you like most people who associate cyber, cyber security, data breaches and other similar terms with computers and technology? When you hear about a data breach in the news, do you immediately wonder which technical vulnerability was exploited? This is probably the reason why so many companies believe that a breach won’t happen to their company. They believe hackers only exploit technical vulnerabilities and somehow their tools and techniques for securing data are better than everyone else’s. Regardless of the reason, most are ignoring the one weak link in the chain that is more easily exploited than most technical vulnerabilities but much more difficult to mitigate — the end-user. The employee with access to the network is by far a much greater threat than just about any technical vulnerability. One click and your network is compromised.

continue
15 Dec 2014 | Guest Authors | Certification, PMP, Project Management
PMP Question of the Week: Project Review

As project manager, you are facilitating a thorough review of project performance and key deliverables as you complete the current major phase of the project. Why is this review important?

continue
12 Dec 2014 | Johnny Bass | CCIE, Certification, Cisco, Routing & Switching
CCIE Routing & Switching Question of the Week: Dynamic Multipoint VPN

Refer to the exhibit. The spoke (R2) of the DMVPN (Dynamic Multipoint VPN) is not able to register to the hub router (R1), why? (Choose all that apply).

continue
11 Dec 2014 | Bob Withers | Communication, Professional Development
Business Continuity and Disaster Recovery:  Business Impact and Risk Analysis

A famous Monty Python routine contains the tag line “No One Expects the Spanish Inquisition!” As funny and as absurd as the scene may be, we can learn strategies for disruptions that either prevent us from performing less-important tasks or force us to completely recover as best we can from a total interruption of our normal lives or our business operations.

continue
10 Dec 2014 | Guest Authors | Certification, CompTIA, Security+
Security+ Question of the Week: Security Risk at Lunch

While away from the office for lunch, you connect your notebook to a free WiFi hotspot provided by the restaurant. You sit in a corner booth, latch the notebook to the table and orient the screen so as to be visible only from your seating position. What security risk have you overlooked?

continue