More Stories About Russians

The news media seems obsessed with Russians.  Whether it is their involvement in the election, relationship with Donald Trump, or assassinating ex-spies, there doesn’t seem to be a day without some scandal involving the Russians.  On April 16th the United States Computer Emergency Readiness Team (US-CERT), a part of the Department of Homeland Security, released… Read more »

Lasting Impacts

Forty-eight years ago today (April 10, 1970), Paul McCartney announced the official breakup of the Beatles. It’s true that relations had been declining for some time, but Sir Paul’s announcement was the first public acknowledgement that the end had arrived. The reverberations of their music continues to ring through popular music even today. And although… Read more »

“GDPR” – Another Acronym You Need to Know!

Privacy is important to all of us but to most Europeans it is even more critical.  I was at a conference a while back and the presenter made the comment that European’s trust of companies and governments are colored by the events of WW2 and totalitarian regimes that used personal data to subjugate and terrorize… Read more »

Back to Basics: Protecting the Perimeter

The past several articles in the Back to Basics series have addressed controls inside the network—passwords, user management, and mobile device security. But even the best of these controls are for naught without strength at the perimeter of your network. Today we consider ways to minimize cybersecurity risk to your organization’s system from the outside… Read more »

SEC Guidance on Cybersecurity

On Wednesday, the SEC issued new guidance for public companies on the disclosure of information about a cybersecurity incident or risk. The previous guidance was issued in October 2011 and a lot has changed since then.  The new guidance is not clear on some of the expectations about timing of informing the public or the… Read more »

Back to the Basics: User Access Management

Ok, so I’m terrible at sports analogies. Forgive me. But with the ever-increasing business risks that come with plugging a computer into a network it often feels as though you’re leading your organization down the gauntlet. I picture American Gladiators circa 1990 with Nitro shooting a tennis ball cannon at us while we try to… Read more »

Back to the Basics: Protecting Mobile Devices

The RAS team recently came up with the idea to go over some general cybersecurity topics at the ten thousand foot level as part of our “Back to the Basics” series. Something that impacts 99.99% of our readers is mobile device security practices, so we wanted to take a moment to talk about why we… Read more »

2000 Years | The Terracotta Army & YHB

2017 was a big year for YHB: we celebrated our 70th anniversary.  Throughout the year we had various events culminating with our Richmond event at the Virginia Museum of Fine Arts (VMFA).  To celebrate our continued success we are helping to sponsor the VMFA’s exhibit: Terracotta Army: Legacy of the First Emperor of China.  We… Read more »

Don’t Forget the WAP

Every year around this time, since it also happens to be close to the day, a memory from high school pops in my head from my 16th birthday. I was a pretty shy kid, so I loathed anything that made me a) the center of attention or b) divulged something about me that was embarrassing…. Read more »

Framing a Framework | Understanding Your IT Environment

IT is complex.  In order to keep the complexity under control it is wise to consider a framework to evaluate and plan your IT environment.  A framework is defined as a basic structure underlying a system, concept, or text.  While generally most frameworks are intended for larger organizations, it can also prove useful in smaller… Read more »