by Alan Deeter | Aug 20, 2017 | Best Practices, Executive Reading, Legal, Technical, Uncategorized
The IoT Cybersecurity Improvement Act of 2017 is well on its way to becoming law. With support of several members in both the House and Senate, plus many technology lobbying groups regularly relied on by Congress, odds are good it will be law by the end of the next...
by Alan Deeter | Jul 29, 2016 | Best Practices, Incidents, SSH, Threats |
It’s a horrible practice for IP-enabled device manufacturers to ship products with default passwords because users often don’t change them. Yet, 44 of the top 50 CCTV manufacturers do exactly that. We’re talking “root/root” and...
by Alan Deeter | Dec 9, 2015 | Best Practices, Executive Reading, Expert Opinion, SSH |
The SANS Institute reports “up to 80% of [IT security] breaches may originate in the supply chain, and they are making sure your customers know how to protect themselves — from you. In a recent white paper they describe best practices to protect your customers...