• CYBER SECURITY
    FOR THE 21ST CENTURY

    Many organizations have security policies, IDS or encryption’s in place. However, they are still being compromised and are not focused on the most effective practices. This is where Milli Micro Systems comes in. Rely on us to stop major breaches of security and even the most elementary of mistakes.

ABOUT MILLI MICRO SYSTEMS

OFFERING VITAL SECURITY
TRAINING FOR A
DANGEROUS WORLD

The Military uses independent training programs,
can you afford not to?

Our customers have included the US Army, US Navy,
US Air Force, National Guard, Department of Interior,
Department of Veterans Affairs, Metropilitan
Water District, County of Los Angeles, State of
California, Chicos FAS, and many more.

CYBER NEWS FEED
  • Relocation costs now a sticking point for job-hunting security managers May 5,2015

    Relocation costs now a sticking point for job-hunting security managers

    With security executives and staff in such demand at many organizations today, is it possible that something like paying for relocation costs could get in the way of hiring a new employee to join the security program? Yes, according to a number of people in the industry."Companies are finally...

  • IDG Contributor Network: Who makes better cybersecurity decisions, men or women? February 16,2017

    IDG Contributor Network: Who makes better cybersecurity decisions, men or women?

    Unfortunately, it’s very common to assume that when women are stressed they are more emotional or that they rely more heavily on intuition or hunches. (If you agree with this notion, spoiler alert - you are wrong…. LOL) Then you’re probably going to rely more heavily on men, not women, in...

  • Report: Web gateways fail to stop malicious outbound communications March 2,2016

    Report: Web gateways fail to stop malicious outbound communications

    In a recent study of a million client devices over the course of 10 months in 2015, every web gateway allowed outbound malicious communications -- though some gateways did better than others.The report, released in mid-February by Seculert, showed that 40 percent of attempted malicious...

  • IDG Contributor Network: Problems that arise with cloud to cloud interactions March 27,2017

    IDG Contributor Network: Problems that arise with cloud to cloud interactions

    I’m not comfortable with the large migration of business applications and security solutions to the cloud. It is clear that large cloud providers have excellent infrastructures - but I’m not comfortable yet.Many firms are heavily investing in cloud security solutions. About three or four...

  • Salted Hash Rehashed: The weekly news recap for July 22, 2016 July 22,2016

    Salted Hash Rehashed: The weekly news recap for July 22, 2016

    Welcome to your weekly recap of news and other interesting items. This week's Rehashed will include Vine stars who borrow Twitter accounts, Snowden's invention, patches, and HIPAA. There will be no Rehashed next week, as Salted Hash will be heading to Las Vegas for BSides Las Vegas, Black Hat,...

  • 36% off Litom Solar Outdoor Motion Sensor Security Lights, 2 Pack – Deal Alert April 7,2017

    36% off Litom Solar Outdoor Motion Sensor Security Lights, 2 Pack - Deal Alert

    This Amazon #1 best selling solar security light is super bright and easy to install wherever you need it. It features 3 modes: (1) Always on, (2) Dim until motion is detected, and (3) Off until motion is detected. It's designed with a large sensor that will detect motion over a larger distance,...

  • Mobile device security for the road warrior August 18,2017

    Mobile device security for the road warrior

    Employees who use their smartphones and other mobile devices while traveling face greater risk that their devices will be compromised, posing a threat to corporate systems. Travelers can minimize the risk by taking a few simple and inexpensive precautions.CSO Senior Writers Steve Ragan and...

  • IDG Contributor Network: Cyber security researchers in high demand April 6,2017

    IDG Contributor Network: Cyber security researchers in high demand

    Miami-Immunity Inc. founder Dave Aitel welcomed the largest crowd ever to this year's Infiltrate 2017, proof that "Offensive is not going anywhere," said Aitel.Even though this particular security conference is geared toward those who are honing their offensive hacking skills, Aitel also...

  • New IoT malware targets 100,000 IP cameras via known flaw May 10,2017

    New IoT malware targets 100,000 IP cameras via known flaw

    Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.  The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said...

  • FireEye customers get liability shield thanks to SAFETY Act May 1,2015

    FireEye customers get liability shield thanks to SAFETY Act

    Last week, the Department of Homeland Security (DHS) certified FireEye under the SAFETY Act, providing their customers protection from lawsuits or claims alleging that the products failed to prevent an act of cyber-terrorism.The news of the certification was reported by FireEye in a press...

  • BrandPost: Healthcare Ailing in Cyber War August 14,2017

    BrandPost: Healthcare Ailing in Cyber War

    Cybercriminals prey on the weak, and they’ve concluded that healthcare organizations are among the most alluring – sitting on massive volumes of potentially vulnerable personal health and financial information. At the same time, growing regulatory requirements leave these organizations...

  • FBI Director Addresses Cyber Security Gathering March 8,2017

    James Comey discussed the current cyber threat landscape, the FBI’s efforts to stay ahead of the threat, and the importance of strong private sector partnerships at the Boston Conference on Cyber...

  • 7 ways to take back control of your cloud strategy October 11,2016

    7 ways to take back control of your cloud strategy

    The age of shadow ITImage by ThinkstockIn 2015, 35 percent of IT spend was managed outside of IT departments, and by 2017, Gartner predicts that CMOs alone will spend more on IT services than CIOs. This includes both insecure and secure cloud apps and services that employees and business units are...

  • Report: Top 25 IT security products April 26,2017

    Report: Top 25 IT security products

    Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud...

  • UK bank suspends online payments after fraud hits 20,000 accounts November 7,2016

    UK bank suspends online payments after fraud hits 20,000 accounts

    The banking arm of U.K. supermarket chain Tesco has suspended online payments for its 136,000 checking account customers following a spate of fraudulent transactions.The bank suspended its payment service for all checking account customers after 40,000 experienced suspicious transactions, bank...

  • IDG Contributor Network: Emboldening the CISO ecosystem February 21,2017

    IDG Contributor Network: Emboldening the CISO ecosystem

    Peer to peer leadership mentoring and executive knowledge sharing is a critically important component to building, strengthening and sustaining our national cybersecurity ecosystem.There are many excellent cybersecurity venues among the priority list of forum offerings. Of the large, annual...

  • IDG Contributor Network: Password database dumps, or dump passwords? December 12,2016

    IDG Contributor Network: Password database dumps, or dump passwords?

    From the U.K.'s National Lottery hack to the news that Facebook bought stolen passwords on the black market to cross-reference with encrypted passwords, the password problems have not (and probably will not soon) gone away.For most of 2016, many security teams have struggled to educate end users...

  • The FBI should try to unlock a shooter’s iPhone without Apple’s help, a lawmaker says March 2,2016

    The FBI should try to unlock a shooter's iPhone without Apple's help, a lawmaker says

    The FBI might be able to copy the hard drive of an iPhone used by a mass shooter without triggering the device's auto-erase functions, thus eliminating the agency's need to take Apple to court, a company executive said Tuesday. Instead of forcing Apple to help defeat the iPhone password...

  • BrandPost: Best of Both Worlds: Hybrid Onsite and Cloud-based DDoS Protection May 24,2017

    BrandPost: Best of Both Worlds: Hybrid Onsite and Cloud-based DDoS Protection

    When familiarity breeds complacency, you may have a serious problem countering cyber threats. For example, the first denial of service (DoS) attack occurred more than four decades ago. By 1999, this mode of attack morphed into distributed denial of service (DDoS) assaults that enlisted multiple...

  • Discounted CleanMyMac 3 with Gemini 2 Space Saving Bundle – Deal Alert April 25,2017

    Discounted CleanMyMac 3 with Gemini 2 Space Saving Bundle - Deal Alert

    CleanMyMac 3 with Gemini 2 in tow is like a professional cleaning team for your Mac. The all-new CleanMyMac 3 will clean, optimize, and maintain your Mac. It scans every inch of your system, removes gigabytes of junk in just two clicks, and monitors the health of your Mac. Gemini 2 finds...

GET THE LATEST CYBER SECURITY NEWS & UPDATES
WHAT TO KNOW

IMPORTANCE

Why Is Cyber Security Important?
The increasing number and sophistication of cyber threats (targeting phishing scams, data theft, and other online vulnerabilities) require us to remain vigilant securing our systems and information.

The average computer does not have proper security controls in place. New attack methods are found every day. There were 183 million accounts compromised in Q3 of 2014 [1]. The number of phishing sites leaped by 10.7 percent over the fourth quarter of 2013[2]. These are just a few examples, and they highlight the importance of cyber security for protecting data and systems.

With BYOD becoming ubiquitous in the workplace, the “trend in cyber security is that IT leaders are losing control of their technology. It’s a trend that obliterates how security has traditionally worked and it can’t be stopped.”[3] Refusing to adapt is more expensive than investing in a new approach.

MMS has that new approach. We know Cyber Security should never be an afterthought, but instead integrated into every new project from the start. Our 5-step program is designed to deal with 95% of security problems right off the bat.

But wait, why aren’t all computer systems secure?
Partly due to hard technical problems, but also due to cost/benefits issues, Security costs and Security usually only pays off when there’s trouble. Typically, it’s the users’ perception that there is no real threat to themselves and they trust everyone, “Here is my password, I trust you’re not going to do anything bad, I don’t have any secrets.” and when that information gets out the user is now compromised. The user is not taking into account how their infected computer can hurt others.

This isn’t just an end user issue either, many key decision makers, as well as the employees in organizations, have this attitude. That is why we have added the 5th step to our program: Training. With the proper training stakeholders and employees can understand the importance of cyber security as a business process, not just something for the I.T. department. The I.T. department exists in an advisory and support capacity but cannot solve all problems by itself. It is in user’s and organization’s best interest to obtain the right knowledge to protect themselves from cyber threats. Our training in cyber security will ensure users will be aware of all important threats and how to be a smart user.

Cyber Security is an important Business issue, but like everything else unless you get buy-in across the board, Cyber Security policies and procedures will be ignored.

  1. http://www.safenet-inc.com/news/2014/q3-data-breaches-compromise-183-million-customer-accounts/
  2. http://docs.apwg.org/reports/apwg_trends_report_q1_2014.pdf
  3. John Pescatore, director of emerging security trends at the SANS Institute

LEADING THREATS

There are many threats, some more serious than others. Some examples of how your computer and systems could be affected by a cyber-security incident – whether because of improper cyber security controls, manmade or natural disasters, or malicious users wreaking havoc-include the following:

Interruption Threats:Denial-of-service refers to an attack that successfully prevents or impairs the authorized functionality of networks, systems or applications by exhausting resources. What impact could a denial-of-service have if it shut down a government agency’s website, thereby preventing citizens from accessing information or completing transactions? What financial impact might a denial-of-service have on a business? What would the impact be on critical services such as emergency medical systems, police communications or air traffic control? Can some of these be unavailable for a week, a day or even an hour?

Malicious Code Attacks:Malware, worms, and Trojan horses: These spread by email, instant messaging, malicious websites, and infected non-malicious websites. Some websites will automatically download the malware without the user’s knowledge or intervention. This is known as a “drive-by download.” Other methods will require the users to click on a link or button.

Botnets and zombies: A botnet, short for robot network, is an aggregation of compromised computers that are connected to a central “controller.” The compromised computers are often referred to as “bots” or “zombies”.These threats will continue to proliferate as the attack techniques evolve and become available to a broader audience, with less technical knowledge required to launch successful attacks. Botnets designed to steal data are improving their encryption capabilities and thus becoming more difficult to detect.

“Scareware” – fake security software warnings: This type of scam can be particularly profitable for cyber criminals, as many users believe the pop-up warnings telling them their system is infected and are lured into downloading and paying for the special software to “protect” their system.

Social Network Attacks: Social networks can be major sources of attacks because of the volume of users and the amount of personal information that is posted. Users’ inherent trust in their online friends is what makes these networks a prime target. For example, users may be prompted to follow a link on someone’s page, which could bring users to a malicious website.

Top 5 Social Networking Attacks

  1. Fake offering
    These offers invite users to use a free gift card or discount coupon; to receive these offers the user must share personal information with the scammer.
  2. Fake Plug-in Scams
    These trick the user into downloading a fake extension or web browser. The infected extension or browser will begin to steal password data and other sensitive information.
  3. Like-jacking
    The fake “Like” button on websites to get users to click on the button; once the user clicks on the “Like” button an installation begins with malware and other malicious code.
  4. Fake-Apps
    Typically, the app is legitimate, but it’s bundled with malware then released again by the attacked and once the user installs or uses the app the malware is released on their machine to wreak havoc.
  5. Manual Sharing
    User is sharing the infected offering that will intrigue other users without knowing what was shared was malicious.

For more information visit: http://msisac.cisecurity.org/

SECURITY VS SAFETY

Safety: Protection from negligence, accidental damage and hurt.

Security: Protection from malign intent.

The difference is People cause security events. This distinction is critical to understanding the role security must play in your organization. Security is therefore a “people problem.” Security programs are only effective when they control the people who have access to those assets.

There are many laws and regulations surrounding safety, but very little time and energy is based on security.

Security is often seen as a checkbox or a list of compliance requirement by an agency. It is often an afterthought and a poorly executed one at that. Frequently the focus is to just make it work and worry about security later. This is of course detrimental to the organization.

  1. http://www.rmasecurity.com/2014/07/the-difference-between-safety-and-security/


REQUEST MORE INFO.

Complete the request form below to learn more about Our Cyber Security Options.

captcha