Internet of Things (IoT) Hack Hardening
Security Cameras become hacker pawn’s because they successfully use the manufacturer’s default username and passwords or worse, the vendor’s secret back door maintenance account like occurred with Sony. Hackers from the “deep web” scan the world’s internet addresses...
Data Breach Obviation – Hop Sphere Radius Security
Data Breach Obviation – Hop Sphere Radius Security A puppy runs toward the path of a truck – as disaster looms, a choker chain limits travel, saving the pup. Similarly, Hop Sphere Radius Security limits data exposure outside the data center. It’s like a “choker...
Why Spending Up Yet More Internet Disturbance Friday Oct 21 2016
Why Are Internet Disturbances and Data Breaches On The Rise? Security - American's buy stuff to solve their problems. This time it is not working. As more's spent, more breaches and disturbances occur. Hackers are enabled by one technical setting that when changed...
Neuter the Golden Goose Server ASAP!
Hop Sphere Radius Security Stops Hackers - Not Even A Login Prompt. "Half the recent outbreak of security breaches could be stopped by implementing Hop Sphere Radius Security". Choose Each Device's Hop Sphere Limit - Even If Firewall Fails - Device Stays Within Limits...
Does Your Golden Goose Server Stick It’s Neck Out On Internet?
Many Back-end "Golden Goose Servers" Connect to the Internet. The term Golden Goose Server applies to devices containing highly sensitive information - financial, health or your most guarded secrets. Protected by firewalls? Maybe, until it's not, happening far too...
Bank ATM and Vault vs Web and Database Server
Servers Containing Sensitive Data - Think Bank Vault - Think Golden Goose Server We term servers containing sensitive data a "Golden Goose Server". Let's discuss metaphorically the bank vault and the Automatic Teller Machine (ATM) in relation to Web and Database...
Golden Goose Security Press Release August 2016
Explain network hop or Time To Live (TTL)
Time-to-live (TTL) and (HOP) Fields in the Internet Protocol packet header, are the terms we use to describe how long a packet can live in a network. During development of the Internet’s (IP) Internet Protocol, the term Time-to-live started at 30 or 60 to represent...
Data Breaches That Golden Goose Security May Have Stopped
<div id="tubepress-express-4pNSRlbhejR-319364"></div><script type="text/javascript">(function(f,e){var...