blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

Mobile/BYOD

Three Remote Working Habits to Implement Today

Posted by Gretel Egan on Nov 18, 2016 9:10:00 AM

With organizations increasingly supporting remote workers, heavy-duty home offices are becoming more commonplace. Whether you work from home occasionally, regularly, or on an everyday basis, it’s likely you’ve adopted a number of habits that help you to work as efficiently and effectively from your home as you would at an on-site location. But have you adopted good cybersecurity practices as well?

Read More »

Three Simple Steps for Securing Your Home WiFi Network

Posted by Gretel Egan on Nov 10, 2016 4:49:23 PM

You may have heard (or read) of the dangers of connecting to free, open-access WiFi networks. But did you know that your home network can also be hazardous to your personal data? If you have not taken the proper security precautions, your home WiFi is likely to be just as vulnerable as the open wireless network at your corner coffee shop. Without the proper defenses, your network could be accessible to anyone with even a modest set of cyber snooping skills.

Read More »

Three Mobile Security Habits to Implement Today

Posted by Gretel Egan on Oct 19, 2016 2:36:31 PM

In relatively short order, mobile devices have become fixtures in our daily lives. Nothing makes this more clear than the fact that my parents have figured out texting and how to take — and send — a picture with their smartphone. It’s rather amazing to think about what is possible today that wasn’t possible just a few years ago.

But as Uncle Ben Parker of Spider-Man fame cautioned, “With great power comes great responsibility.” (That’s totally who said it. You can look it up.) Our devices help us connect, work, shop, and play — and to enable that, they hold a lot of personal information. Protecting our devices is akin to protecting ourselves.   

It’s time to banish that alter ego who sits on your shoulder and tells you that things like identity theft can’t happen to you. Instead, power up by making the following mobile security tips a part of your cybersecurity arsenal. 

Read More »

Staying Secure at Black Hat USA

Posted by Kym Harper on Jul 29, 2016 9:39:32 AM

Last updated: July 19, 2017

We asked our Director of Information Security, Josh Roark, and our Chief Architect, Kurt Wescoe, for some cybersecurity tips that our team and others can use at the forthcoming Black Hat USA conference (and beyond). If you are preparing to head to Las Vegas next week for Black Hat and/or DEFCON — which at this time of year is sometimes referred to as "Hacker Summer Camp"  here are a few things to keep in mind:

Read More »

What Pokémon GO Is Teaching Us About Mobile Device Security

Posted by Gretel Egan on Jul 14, 2016 9:51:47 AM

Last updated: August 19, 2016

If you haven’t yet heard of the Pokémon GO phenomenon, it’s possible you’ve been transported to an alternate reality. Because it is a THING. Actually, it is a BIG THING. (This has been confirmed by my kids, their pals, several coworkers, and about a bajillion news stories. I’ll take “Things I Don’t Understand Because I’m Old and Lame” for $400, Alex.)

As is the case with most BIG THINGs, the spotlight draws the honest and the dishonest. And given that Pokémon GO lives in the mobile world, the exploitability of this digital dynamo is drawing cybercriminals and scammers to Pikachu and company like moths to a flame (as is evidenced by the phishing attacks that were afoot in what seemed like seconds).

Read More »