by Wesley Tomatsu | Oct 28, 2015 | Tech Tips
The standard narrative when talking about cyber security makes assumptions about who your adversary is. For a long time, it was the lone tech-savvy teenager in some Baltic or Eastern European country. Then, it was online criminal enterprises. Most recently, it was...
by Wesley Tomatsu | Oct 21, 2015 | Tech Tips
Information security, very broadly, concerns itself with three main principles: Confidentiality – information is only available on a need to know basis. Integrity – the information, when accessed, is accurate and has not been tampered with. Availability...
by Wesley Tomatsu | Oct 20, 2015 | Tech Tips
Last week, I briefly introduced the term “operational security“. If using anti-malware software, installing security updates and keeping your data backed up are the “book smarts” of cyber security, operational security represents the...
by Wesley Tomatsu | Oct 16, 2015 | Tech Tips
This was something I wanted to do last year but didn’t have the time to do it right. I think I have a good batch that will hopefully by challenging and enlightening. Answers are presented below the questions in white text – to see the answer, highlight...
by Wesley Tomatsu | Oct 14, 2015 | Tech Tips
Despite your best efforts, you may still find your computer filled to the brim with malware. I started off this month by talking about what to do if your identity were to be stolen. This will be less about how to recover from specific threats and more about general...