Trusted Internet Blog

Thoughts, Guidance, Musings

What is a Data Breach?

What is a data breach? According to CBR online, 4.5 billion records were compromised in data breaches within the first 6 months of 2018. In comparison, there are merely about 7.5 billion people living on the planet. What is a data breach and why should you care about it? A data breach refers to the act of obtaining someone’s sensitive information from the internet. This information could be your passwords, sensitive media, PIN, credit card numbers, license numbers, software access to your company; virtually any piece of information that you’ve stored on the internet. This information is then used for blackmailing purposes or sold on the dark web. Data breaches occur on almost a daily basis. Last year hackmegeddon (one of my favorite stats sites) reported 1337 compromises.  This represents a very small number compared to the global dataset, but represents a strong enough sample for discussion purposes. 
Read More

Ransomware - Your defining moment? or your Oh 💩 moment?

Not a day goes by without another major news story (although, are they really major stories anymore?). However, the Norsk Hydro Ransomware event will definitely get its few minutes of journalistic play. 
Read More

ASUS Computers with Factory Installed Backdoors? No way!

Kaspersky reported today that ASUS computers were pushed out of the factory with malware (a backdoor) installed. Should you care? Maybe. 
Read More

A Ransomware Playbook. Ransomware can be prevented.

About a year ago, I helped pay out a ransomware case, which at that time was one of the largest of its kind  .. Why? Because the company HAD to.  They were completely unable to conduct any business unless they did.  How were they completely locked down? Thats a different conversation, but the lessons learned might help you today. Over the weekend, the Ryuk ransomware strain was reported by ZDNet as the suspect malware in a cyber attack that caused printing and delivery disruptions for several major US newspapers over the weekend, Los Angeles Times and San Diego Union Tribune., the West Coast editions of the Wall Street Journal and New York Times, which are printed at the Los Angeles Times’ Olympic printing plant in downtown Los Angeles.  As ransomware becomes the weapon of choice, here are a few things you can do to make sure you don't find yourself in a shutdown, faced with paying out one of these monster ransoms.
Read More

What is Breach Data used for?

on Dec 22, 2018 1:07:30 PM By | Jeff Stutzman, Chief Information Security Officer | 0 Comments | Case Studies home security
Christmas is one of the business scammer times during the year. Data breaches seem to be a daily occurrence. So what. Who cares if they steal my account information from during your last minute Christmas shopping? It's not like I do anything with that account anyway right?
Read More

Are Your Home Surveillance Systems Spying You?

We're batting 1000. Trusted Internet has installed in-home cyber security monitoring and protection systems for various Executives, and in each case, we've stopped in-home surveillance video from being taken out of the home by bad guys. Here are a couple of examples, and what you can do about it.
Read More

Cyber Security Case Study: Trusted Internet Stops Dangerous “Gh0stRat” at Two Companies in US and Canada

Recently Trusted Internet deployed and installed a Small Business Unified Threat Manager (UTM) service, to a 100 person oil and gas engineering company in Canada. Within 12 hours...
Read More

“woshihaoren” (我是好人)

I posted this in 2013.  It's one of my favorite stories to let small defense contractors know just have much other people want the things you make for the government. This is a true story. Honestly, ya just can't make this stuff up.
Read More

Does your UTM suck? Replace it now and save up to $1400.

You know your UTM sucks if...
Read More

Who's hacking who?

I'm not much for scare and sell tactics, but this information is obtained purely from external, open sources.. no hacking, no stealing or underhanded techniques. If you're showing up in our research, I figure you might want to know... We've already blocked these addresses in the companies that we protect. 
Read More