Best

now browsing by tag

 
 

#nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice

Source: National Cyber Security – Produced By Gregory Evans

An Inter-Ministerial Round Table on cyber security and cybercrime in West Africa was held in Accra, Ghana, as high-level event of the Climax Week of the National Cyber Security Awareness Month. The meeting gathered together Ministers, diplomats and other dignitaries of countries from the ECOWAS Region, including Ministers from Ghana, Guinea Bissau, Liberia, Niger, Sierra Leone. The meeting was chaired by the Minister for Communication of Ghana, co-chaired by ECOWAS and the Council of Europe, and attended by additional participants coming from Embassies of Burkina Faso Togo and Benin, Ministry of Communications of Nigeria, U.S. Department of State, UK High Commission.

 

A declaration was prepared in the end of the meeting, reporting the main take aways of the day, and will be formally submitted by the Ghanaian government to the next gathering of the ECOWAS Technical Committee.

 

During the meeting, ECOWAS Commission endorsed Ghana as the champion in the region on cyber security and cybercrime matters, requesting the country to act as “ambassador” in the field and share best practices with neighboring countries.

 

Source link

The post #nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice appeared first on National Cyber Security.

View full post on National Cyber Security

4 Best Free Online Security Tools for SMEs in 2020

Source: National Cyber Security – Produced By Gregory Evans Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of business, says CNBC in its analysis of a recent Accenture report. In light of the global cybersecurity skills shortage, the number is set to soar […] View full post on AmIHackerProof.com

#cyberfraud | #cybercriminals | What date do the sales start and how to find the best offers?

Source: National Cyber Security – Produced By Gregory Evans

Love it or hate it, there’s no denying the unstoppable force of Black Friday. What started off as a tradition across the pond has now become the highlight of every British bargain-hunter’s calendar. 

Whether you’re brave enough to flock to Oxford Street or prefer to shop online from the comfort of your own bed, there are serious savings to be had. Laptops, games consoles and clothes are all sold at a fraction of the price – perfect if you want to do some early Christmas shopping.

Because this event only comes around once a year, you need to be as prepared as possible – ideally, knowing exactly what you’re looking to buy. To help you prepare for your guilt-free shopping spree, therefore, we have created a guide of everything you need to know about Black Friday – including the start date, how to find the best deals, how to be safe when shopping online, and predictions of this year’s big-sellers.

What is Black Friday?

Black Friday is a tradition that originates from America, where retailers cut prices on a huge range of items the day after Thanksgiving. However, in recent years Britain has also jumped on the bandwagon.

As such, you can expect major UK retailers to cut prices on a large selection of items – including big-budget electrical items, beauty gift sets, kitchen equipment and clothes. 

Source link

The post #cyberfraud | #cybercriminals | What date do the sales start and how to find the best offers? appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | A fake movie review show just spawned one of the year’s best comedies

Source: National Cyber Security – Produced By Gregory Evans

A parody movie review show has, surprisingly enough, spawned an elaborate fictional universe spanning almost a decade. Now it’s making the jump to feature film, and there’s no sign of it losing steam.

The story of Mister America, the new mockumentary about a long-shot campaign for local office out on video on demand Friday, is a complicated one. It begins in 2011 when comedians Tim Heidecker and Gregg Turkington launched the spoof podcast On Cinema, episodes of which center around discussions of classic movies. But the amateur critics, fictional characters who share Heidecker and Turkington’s real names, supply the opposite of insightful commentary, generically declaring “it’s a classic!” before quickly wrapping up.

The gag continued as the podcast became a web series called On Cinema at the Cinema, a shabby Siskel and Ebert-type show with Tim and Gregg reviewing new releases. Once again, there’s no expertise to be found. Observations from the fumbling hosts are always either uproariously wrong or worthlessly broad, and nearly every film gets a glowing review. Both projects hilariously poke at the fact that the internet has fostered a culture of amateur creators oblivious to the uselessness of their creation and amateur commentators clueless about the very topics they’re commenting on.

But beyond being a spoof of pointless online content, On Cinema is also an examination of two pathetic, borderline psychopathic characters. Tim, an egotistical blowhard, and Gregg, a pretentious film “expert” who knows little about film, make each other miserable yet have nothing in their lives but this lousy show, meaning their constant on-screen fights and meltdowns always resolve with a return to set the following episode. The longer they continue coming back and failing to improve themselves or On Cinema, the bleaker, and funnier, it gets.

As On Cinema progresses, references to both characters’ dreary off-screen lives develop a deep mythology, and running jokes build a language for fans to use online while maintaining the charade that the show isn’t fiction. Heidecker and Turkington also further storylines with in-character tweets, essentially creating a year-round alternate reality game. Getting into the series requires patience, seeing as episodes don’t have obvious setups and punchlines. But once you start appreciating the dry humor of the hosts’ passive aggression and believably dumb remarks, there’s nothing quite like it.

Over the years, On Cinema has only grown more ambitious with numerous spin-offs, including Decker, a spy series Tim ineptly directs and stars in that subtly advances the larger story in a way that’s legitimately inventive. One edition of On Cinema, for instance, features Tim interviewing Gregg in front of a green screen for reasons that aren’t clear until Tim later that month uses the footage to insert Gregg into an episode of Decker without his permission, prompting yet another gut-busting squabble in a gag that takes weeks to show its true form. The wildest spin-off of all, though, came in 2017 when Tim faced murder charges in On Cinema‘s ninth season, the latest in a nutty sequence of soap opera level plot turns, and Adult Swim actually streamed a five-hour, surprisingly realistic trial.

This helped launch Mister America, the new mockumentary which follows Tim as he runs for district attorney to exact vengeance upon the prosector who charged him. Shot in a mind-boggling three days, it’s quite small in scale, and like On Cinema itself, it’s not so much about traditional setups and punchlines as it is about stewing in delusion and subtle stupidity; scenes often consist of little more than Tim dictating a nonsensical press release between burps or bloviating about Martin Luther King Jr. While unlikely to have much wide appeal, for On Cinema devotees, it’s a riot.

In a testament to how sprawling On Cinema has become, Mister America pulls from jokes that originated not only in the web series but on Decker, the murder trial, and even the comedians’ social media, where the election storyline unfolded last year. Naturally, it’s hard to imagine key scenes registering with newcomers. But when, for instance, Gregg speaks about Sully in an interview, it gets a huge laugh from those who realize the subtext: he’s only doing so to get in a petty dig at Tim as part of an argument they’ve had, primarily on Twitter, dating back years. When Tim watches Mister America and hears everything Gregg said, not to mention sees everything else he instructed the fictional director not to include, he’ll surely freak out on On Cinema, which is currently in the middle of a new season. This kind of slow burn multimedia storytelling is the series at its very best.

Mister America isn’t any sort of a masterpiece, to be sure; it’s limited by its tiny budget and isn’t as effective of a political satire as it could have been, especially seeing as a final monologue attempting to make a broader point feels at odds with the way the story actually played out. But it’s still consistently funny, and as a small piece of the larger project, it delivers.

This is in contrast to Between Two Ferns: The Movie, another spin-off of a web series about a terrible talk show. With that film, it was clear there had been little thought previously paid to the world the sketch occupies or who its central character is outside of the show, and so the struggle to turn it into a 90-minute feature was palpable. That Mister America, in contrast, feels like a natural evolution of everything that’s been cooking since 2011 is a testament to Heidecker and Turkington’s brilliant creation. It sounds strange to say about a silly spoof, but On Cinema has become a genuinely rich comedic world, and even after all this time, its creators are still finding new ways to expand it.

Want more essential commentary and analysis like this delivered straight to your inbox? Sign up for The Week’s “Today’s best articles” newsletter here.

Source link
——————————————————————————————————

The post #deepweb | <p> A fake movie review show just spawned one of the year’s best comedies <p> appeared first on National Cyber Security.

View full post on National Cyber Security

Is #compliance the best #insurance for #managing #cybersecurity #risk in 2018?

Source: National Cyber Security News

Cybersecurity challenges and risks continue to emerge as top threats to business as usual for large and small organizations alike. The ability to meet these threats requires understanding emerging standards. Compliance with these new standards can help organizations implement a proven risk management framework without having to reinvent the wheel. Demonstrable adherence to such frameworks helps with managing liabilities that may arise.

Compliance to many is a dirty word and often misunderstood especially in the area of information security and risk management. However, in response to the increasing number of data breaches and real economic loss as well as threats to national security, regulators and policy makers are increasingly responding with laws, policies and regulations. There is an increasingly prescriptive set of security requirements that must be met by businesses and organizations operating online. Some of the recent data breaches have shown that cybersecurity risk can originate from the supply chain of vendors and business partners.

Understanding this dynamic, the U.S. Department of Defense started the ball rolling in 2013 requiring businesses and contractors to implement 110 specific security requirements described in NIST Special Publication 800-171 as part of a modification to the Defense Federal Acquisition Regulation Supplement (DFARS).

Read More….

advertisement:

View full post on National Cyber Security Ventures

3 best #practices for a #layered #cybersecurity #program

Source: National Cyber Security – Produced By Gregory Evans

As the circumstances surrounding WannaCry, Petya/Goldeneye, the Shadow Brokers and exposed voters’ records have shown, cybersecurity events continue to cripple companies no matter their size or industry.

Although cybersecurity is both broad and complex, some best practices can help prevent hackers from successfully infiltrating your customers’ operations. A mature cybersecurity program relies on a layered security approach — meaning that no single control is the only source of protection for a corporate asset. Three controls that make up a layered security approach are secure password practices, multi-factor authentication and security awareness training.

Secure password practices

For many people, it’s difficult to remember unique, complex passwords for every website — a complication that leads to password reuse. Unfortunately, cyber criminals recognize this as a normal occurrence. When your credentials are compromised on one site, they will take that username and password and try it other places, with success.

As a solution, use a password manager tool. These services ask you to remember one master password and, through a browser extension, will automatically log you in to all of the websites you visit using a longer, more complex password that you don’t need to know. What’s the advantage? If a company, such as your bank, is compromised, the stolen password only allows access to your bank and nowhere else.

Steps to multi-factor authentication

Multi-factor (or two-factor) authentication (MFA or 2FA) is more straightforward than how it may initially seem. MFA is a combination of two of these three factors:

Something you know: a piece of information that you have memorized, such as a password.

          1. Something you have: Historically, this was a physical token that displays a 6-digit number, which changed every 30 seconds. Today, this method uses app on a user’s smartphone. In either case, it is not necessary for the owner to memorize the multi-digit code, provided that they have the device or app with them when logging in.
          2. Something you are: biometrics, such as a smartphone’s built-in fingerprint reader.
          3. Something you are: biometrics, such as a smartphone’s built-in fingerprint reader.

When MFA is used, it becomes much more difficult for an attacker to gain unauthorized access to an account. Not only would he or she need to steal your password, but the criminal would also need to physically steal, or hack into, your token device or biometric data, both of which are far more difficult tasks. An additional best practice is to use MFA on all remote connectivity, and for any activity requiring administrator-level access.

Creating security awareness

Your customers can be their companies’ strongest security assets or weakest links. Employees who click on malicious links and open attachments can easily bypass other cyber protections. Phishing attacks, situations in which an employee receives a legitimate-appearing, but actually malicious email, are one of the top causes of data breaches.

Ten years ago, phishing attacks came from a “Nigerian prince” and were easy to identify. These days, attacks are much more sophisticated and are timed with current events, such as business transactions or the April 15 tax day. Attackers also will take time to create “spear phishing” attacks, in which a specific person or company is targeted. Spear phishing uses information from a user’s LinkedIn page or other social media accounts to appear plausible.

Your customers should regularly conduct security awareness training for employees. Training should include regular communications on current security events and in-house phishing campaigns performed on a frequent basis. The in-house campaigns test employees with seemingly realistic phishing emails that, thankfully, are anything but.

Criminals will always be thinking of new ways to attack businesses and consumers, which forces businesses to constantly evolve their cybersecurity practices. It is only through constant vigilance that we can continue to protect ourselves in this ever-escalating environment.

 

The post 3 best #practices for a #layered #cybersecurity #program appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Best Practices for Cybersecurity Are Simple and Keep Users in Mind

Source: National Cyber Security – Produced By Gregory Evans

As students, faculty and staff settle into the routines of a new semester, it’s the perfect time for a refresher on cybersecurity. Perhaps this is why October is designated National Cybersecurity Awareness Month. CIOs and CISOs have an opportunity to educate users on the basics of good cyberhygiene before they…

The post Best Practices for Cybersecurity Are Simple and Keep Users in Mind appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity Best Practices for Small Businesses

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans The impact of the Equifax data breach that compromised the personal data of over 145 million individuals has left many confused, frustrated and downright angry. And while massive attacks on large corporations make headlines, small businesses have just as much, if not more, at stake. According […] View full post on AmIHackerProof.com | Can You Be Hacked?

Hacking Doesn’t Effect the Best Online Trading Sites

Source: National Cyber Security – Produced By Gregory Evans

The Internet is a wonderful resource for doing business; but the fact remains that there is a need for security of online transactions. Online transactions are vulnerable and everyone who does business on the Net has a responsibility to make it safe for its e-commerce customers. Certainly, the Internet community…

The post Hacking Doesn’t Effect the Best Online Trading Sites appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses

Source: National Cyber Security – Produced By Gregory Evans

At DEF CON this past weekend Hyrum Anderson of security firm Endgame demonstrated an alarming AI application: modifying malware to defeat machine learning antivirus software. The core premise of Endgame’s experiment was that every AI has blind spots, and those blind spots can be exploited by other AI. By hammering…

The post AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures