OK so now there’s a few things I have not known. CSS variables are new to me. Similar to SASS and other preprocessers. I love Flex, what a godsend. Next week, Javascript!
Coding Camp – Day 5
We are moving from advanced CSS this week to Javascript next. It’s filling all the areas where I was weak or just did not know.
Coding Camp – Day 4
So we discussed advanced CSS. I am still doing some catch-up on Flexbox, but I get the gist. There are a variety of people in class, all smart and near where I am in dev. Things are picking up.
Coding Camp – Day 3
Just getting bearings with gitlab. I’ve had my own github for a bit now, but finally using it. Lot of people of different backgrounds in class. There are no dumb questions! 8^)
Coding Camp – Day 2
Brushed off the old CSS skills. Pretty standard stuff, but with a few different understandings on OO.
Coding Bootcamp Day 1!
Eager to see what this is like. Will update!
Update: This was a good beginning. I’m getting the gaps in knowledge filled in. Personable staff and students probably about my experience level at most things. We just worked on using git and the command line.
CIS Security Controls Explained
When we talk about security controls we are talking about technical and operational steps and settings for preventing or minimizing attacks. The Center for Internet Security has listed 18 controls as critical. With them you can minimize the risk of data breaches and exfiltration, IP and ID theft, corporate espionage, privacy loss, and denial of service attacks, among other cybersecurity threats. Continue reading “CIS Security Controls Explained”
Pandemic Blues: the Clock is Ticking and the Hackers are Calling.
2021 was witness to a number of major cyberattacks: SolarWinds, Microsoft Exchange, Quanta, Colonial Pipeline, Kaseya, and Log4j. These attacks proved that food companies, utilities, supply chains and software providers could all be compromised. Cybercrime is up 600% since the pandemic began: Continue reading “Pandemic Blues: the Clock is Ticking and the Hackers are Calling.”
Bank cyber recommendations
A local bank sent out a newsletter about how relying on caller ID is no longer possible. Scammers can spoof phone numbers.
Also, watch out for callers impersonating a bank, credit card or other financial account representative. Don’t provide any PII or financial account information over the phone. Hang up and call your institution directly. Do not click any email links or texts if you don’t know if they are from who they say they are.
Watch out for scammers saying fraud has occurred and phone calls, texts, links or emails that try to get you to provide real information about your accounts. Don’t perform any sending or transferring of money by phone, text or email. Banks will never get you to transfer money to yourself.
- Who are you sending money to?
- Who are you talking to or emailing?
- Avoid giving out PII or account details.
- When in doubt, hang up and call your bank directly.
- Avoid urgent requests for money or supposed account problems.
Don’t think it can’t happen to you. What’s at risk?
You may not want to address cybersecurity, thinking it can’t happen to you. But it can. You hear the stories about the big companies hit with a cyberattack, but thousands of attacks are happening right now. Sixty seven percent of SMBs with fewer than 1,000 employees have experienced a cyberattack; fifty-eight percent have been hit with a data breach. An attack will affect everything you do–and more than likely (60% of SMBs) lead to bankruptcy within a year.
Everything you’ve worked for and love.
Finances are the thing that you as a business owner are, rightly, concerned about. Even if your company does not end up bankrupt, your business could be saddled with immense costs, possible fines and lawsuits over a data breach. Day-to-day operations that could be disrupted: employee daily workflows, customer service, and regulation and compliance requirements.
Your plans for the future could also be threatened. You saw a vision for the future, attracting new customers, generating new business and creating a well-known brand. Your reputation could be damaged.
Part of the growth threatened is improvements in employee communication, performance, motivation and cyber savvy, and you can’t attract new, diverse talent to a company with a bad rep.
Over 92% of cyberattacks start with email. It may have been a careless employee who put your business at risk, clicking a phishing link or being scammed by email. That’s means you know how to stop most attacks: cyber education for your employees.
You need to prepare. Fight for what you love and built.
How to move WordPress to new domain name
So with the move / switch to a new domain name, I encountered something that would seem simple enough to fix. My hosting company switched the site for me and the root domain name changed so everything was broken, i.e. the CSS and JavaScript were not loading and only unstyled text was showing. I thought (wasn’t sure at the time and was hoping for the best) that the problem was the root domain. Continue reading “How to move WordPress to new domain name”
New URL
Moved site to jcberry.io
Whew!
Wizard Spider call centers
On the dark web you can buy call center services and bot armies that are amazing in scope (“hundreds of millions of dollars in assets. ..The group’s extraordinary profitability allows its leaders to invest in illicit research and development initiatives,’ the researchers say. ‘Wizard Spider is fully capable of hiring specialist talent, building new digital infrastructure, and purchasing access to advanced exploits.'”). https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up
It is impressive. Wizard Spider also leverages BEC.
Funny passwords!
As a system admin you need to be on the lookout for people who make these. “[T]here were 1,862 data breaches in 2021 — a 68% increase over breaches in 2020. And, new year-over-year results indicate a fast start to data breaches in 2022, as more than 90% of data breaches are cyberattack-related.”
https://www.securitymagazine.com/articles/97518-the-20-most-common-passwords-leaked-on-the-dark-web
Pandemic depression, self-harm and suicide jumps
It’s easy to blame the pandemic for everything, but there was a 45% increase in self-injury and suicide cases among 5- to 17-year-olds in the first half of 2021. We can blame social media, and we’d be right to, but it’s not all due to that either.
Now I don’t have children, but my interactions with friends’ kids and my nephews have made me realize that there is intense need for understanding and importance in our youth at those ages. Then in college, young adults are trying to grasp their meaning and place in the world through a career. Both of these times are critical in self development–but the last thing they needed was a pandemic shutdown (imho).
https://www.morningbrew.com/daily/stories/2022/04/24/the-teen-mental-health-crisis-mystery
Mailchimp: the hack, the user education?
Took some time with 300 accounts being compromised and getting personal information through them. Used social engineering and hit client Trezor. Here a corporate policy that recommends exactly what they are hit with.
Took some planning:
“The phishing application is a cloned version of Trezor Suite with very realistic functionality, and also included a web version of the app,” the crypto wallet company wrote in a blogpost.”
As usual, some irony dripping off this one when compared to the recommendations on their site help:
“You received an unexpected email from Mailchimp staff or service teams. This may include forgot username emails or password reset emails you didn’t request…For an extra layer of security, we encourage you to set up two-factor authentication with SMS or a two-factor authentication app”
https://mailchimp.com/help/i-think-my-account-has-been-compromised/
Bermuda Citizen Number One
Larger than life.
At the Royal Bermuda Yacht club, Charles lifted his whisky again and let loose some blue language. Then with that twinkle in his eye flirted with my mother. He had just returned from the Arctic sailing trip with Warren “War Baby” Brown and was once again the center of attention in Hamilton.
Continue reading “Bermuda Citizen Number One”
New look
Got a new look here with my new logo and domain name. The .com and .net were taken.
Cyber recommendations for wartime
Saw these recommendations for cyber today. Organizations should be vigilant for the evergreen practices: employee training about phishing and social engineering, give only the permissions needed to users, and scan for vulns and lock down ports you don’t use. But it adds, clean up old accounts (a practice for admins) and resist trying out new security measures.
Four key cybersecurity practices during geopolitical upheaval | Malwarebytes Labs
CISA has also put out some recommendations: Shields Up | CISA
Two Realities
Been reading John Bolton’s The Room Where It Happened. I thought that Trump was reined in by the “adults in the room.” While that sometimes happened, those very same people failed in doing so in the long run.
The other reality? My relative just listened to another Trump rally today.
I don’t understand what the man is rallying for. Like my friend Gijo notes, neither Reagan nor the Bushes threw rallies after they left office. I also remember my first following politics in 1992. Bob Dole, while being unfortunately noncharismatic, was understandable and coherent. He didn’t fly off the handle, at least publicly. Trump brought vitriol and instability as he coped with a job he was unsuited for.
Is he planning a 2024 run? It seems so. There has to be a sane alternative.