Checked Your Credit Since the Equifax Hack?

A recent consumer survey suggests that half of all Americans still haven’t checked their credit report since the Equifax breach last year exposed the Social Security numbers, dates of birth, addresses and other personal information on nearly 150 million people. If you’re in that fifty percent, please make an effort to remedy that soon.

Credit reports from the three major bureaus — Equifax, Experian and Trans Union — can be obtained online for free at annualcreditreport.com — the only Web site mandated by Congress to serve each American a free credit report every year. Continue reading Checked Your Credit Since the Equifax Hack?

USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online

In October 2017, KrebsOnSecurity warned that ne’er-do-wells could take advantage of a relatively new service offered by the U.S. Postal Service that provides scanned images of all incoming mail before it is slated to arrive at its destination address. We advised that stalkers or scammers could abuse this service by signing up as anyone in the household, because the USPS wasn’t at that point set up to use its own unique communication system — the U.S. mail — to alert residents when someone had signed up to receive these scanned images.

The USPS recently told this publication that beginning Feb. 16 it started alerting all households by mail whenever anyone signs up to receive these scanned notifications of mail delivered to that address. The notification program, dubbed “Informed Delivery,” includes a scan of the front and back of each envelope or package destined for a specific address. Continue reading USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online

Chronicle: A Meteor Aimed At Planet Threat Intel?

Alphabet Inc., the parent company of Google, said today it is in the process of rolling out a new service designed to help companies more quickly make sense of and act on the mountains of threat data produced each day by cybersecurity tools.
Countless … Continue reading Chronicle: A Meteor Aimed At Planet Threat Intel?

All Cybersecurity Investments Are Not Created Equal

Instead of traditional endpoint security solutions, organizations should spring for cybersecurity investments that improve their ability to fend off serious, unknown threats, not just familiar ones.

The post All Cybersecurity Investments Are Not Created Equal appeared first on Security Intelligence.

Continue reading All Cybersecurity Investments Are Not Created Equal

Some Basic Rules for Securing Your IoT Stuff

Most readers here have likely heard or read various prognostications about the impending doom from the proliferation of poorly-secured “Internet of Things” or IoT devices. Loosely defined as any gadget or gizmo that connects to the Internet but which m… Continue reading Some Basic Rules for Securing Your IoT Stuff

Some Basic Rules for Securing Your IoT Stuff

Most readers here have likely heard or read various prognostications about the impending doom from the proliferation of poorly-secured “Internet of Things” or IoT devices. Loosely defined as any gadget or gizmo that connects to the Internet but which most consumers probably wouldn’t begin to know how to secure, IoT encompasses everything from security cameras, routers and digital video recorders to printers, wearable devices and “smart” lightbulbs.

Throughout 2016 and 2017, attacks from massive botnets made up entirely of hacked IoT devices had many experts warning of a dire outlook for Internet security. But the future of IoT doesn’t have to be so bleak. Here’s a primer on minimizing the chances that your IoT things become a security liability for you or for the Internet at large. Continue reading Some Basic Rules for Securing Your IoT Stuff

Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.

The post Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy appeared first on Security Intelligence.

Continue reading Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

Security Monitoring and Analytics: Faster Time to Action

Security monitoring and analytics platforms deliver business value by reducing the time it takes to identify, investigate and remediate threats.

The post Security Monitoring and Analytics: Faster Time to Action appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: Faster Time to Action

Security Monitoring and Analytics: From Tools to Platforms

An evolved security monitoring and analytics platform — as opposed to a tools-based approach — can help analysts make better use of available threat data.

The post Security Monitoring and Analytics: From Tools to Platforms appeared first on Security Intelligence.

Continue reading Security Monitoring and Analytics: From Tools to Platforms