Trusted Internet Blog

Thoughts, Guidance, Musings

Jeff Stutzman, Founder

Mr. Stutzman personally operates as the CISO to the head coach of an NBA team, a $3.5 billion Houston oil and gas engineering and services company, a northern Virginia physical security company, and Wall Street CEO while supervising Virtual CISOs responsible for protecting executive homes and their companies around the world. He has been cited in the Wall Street Journal, Wired Magazine, NH Public Radio, and numerous trade publications. He holds a BS from Excelsior College, an MBA from Worcester Polytechnic Institute, and is a Harvard Kennedy School Senior Executive Fellow.

Recent Posts

IBM Study Shows Data Breach Costs on the Rise; Financial Impact Felt for Years

on Jul 23, 2019 1:47:19 PM By | Jeff Stutzman, Founder | 0 Comments | data breach equifax identity theft ibm
What does a Data Breach cost?
Read More

Equifax - The Cost of a Data Breach

on Jul 22, 2019 7:50:23 AM By | Jeff Stutzman, Founder | 0 Comments | data breach equifax Federal Trade Commission
(Federal Trade Commission) In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. Under a settlement filed today, Equifax agreed to spend up to $425 million to help people affected by the data breach. If you were affected by the Equifax breach, you can't file a claim just yet. That's coming. But you can sign up for FTC email alerts about the settlement at ftc.gov/Equifax .
Read More

What is a Data Breach?

What is a data breach? According to CBR online, 4.5 billion records were compromised in data breaches within the first 6 months of 2018. In comparison, there are merely about 7.5 billion people living on the planet. What is a data breach and why should you care about it? A data breach refers to the act of obtaining someone’s sensitive information from the internet. This information could be your passwords, sensitive media, PIN, credit card numbers, license numbers, software access to your company; virtually any piece of information that you’ve stored on the internet. This information is then used for blackmailing purposes or sold on the dark web. Data breaches occur on almost a daily basis. Last year hackmegeddon (one of my favorite stats sites) reported 1337 compromises.  This represents a very small number compared to the global dataset, but represents a strong enough sample for discussion purposes. 
Read More

Ransomware - Your defining moment? or your Oh 💩 moment?

Not a day goes by without another major news story (although, are they really major stories anymore?). However, the Norsk Hydro Ransomware event will definitely get its few minutes of journalistic play. 
Read More

ASUS Computers with Factory Installed Backdoors? No way!

on Mar 26, 2019 3:45:03 PM By | Jeff Stutzman, Founder | 0 Comments | Insider Network Security Information Security botnet ceo trojan
Kaspersky reported today that ASUS computers were pushed out of the factory with malware (a backdoor) installed. Should you care? Maybe. 
Read More

A Ransomware Playbook. Ransomware can be prevented.

About a year ago, I helped pay out a ransomware case, which at that time was one of the largest of its kind  .. Why? Because the company HAD to.  They were completely unable to conduct any business unless they did.  How were they completely locked down? Thats a different conversation, but the lessons learned might help you today. Over the weekend, the Ryuk ransomware strain was reported by ZDNet as the suspect malware in a cyber attack that caused printing and delivery disruptions for several major US newspapers over the weekend, Los Angeles Times and San Diego Union Tribune., the West Coast editions of the Wall Street Journal and New York Times, which are printed at the Los Angeles Times’ Olympic printing plant in downtown Los Angeles.  As ransomware becomes the weapon of choice, here are a few things you can do to make sure you don't find yourself in a shutdown, faced with paying out one of these monster ransoms.
Read More

What is Breach Data used for?

on Dec 22, 2018 1:07:30 PM By | Jeff Stutzman, Founder | 0 Comments | Case Studies home security
Christmas is one of the business scammer times during the year. Data breaches seem to be a daily occurrence. So what. Who cares if they steal my account information from during your last minute Christmas shopping? It's not like I do anything with that account anyway right?
Read More

Are Your Home Surveillance Systems Spying You?

We're batting 1000. Trusted Internet has installed in-home cyber security monitoring and protection systems for various Executives, and in each case, we've stopped in-home surveillance video from being taken out of the home by bad guys. Here are a couple of examples, and what you can do about it.
Read More

Cyber Security Case Study: Trusted Internet Stops Dangerous “Gh0stRat” at Two Companies in US and Canada

on Dec 16, 2018 5:35:13 PM By | Jeff Stutzman, Founder | 0 Comments | Cyber Information Security gh0strat
Recently Trusted Internet deployed and installed a Small Business Unified Threat Manager (UTM) service, to a 100 person oil and gas engineering company in Canada. Within 12 hours...
Read More

“woshihaoren” (我是好人)

I posted this in 2013.  It's one of my favorite stories to let small defense contractors know just have much other people want the things you make for the government. This is a true story. Honestly, ya just can't make this stuff up.
Read More