Saturday, March 28, 2020

Via TabulaRosa Systems - Today is Earth Hour at 8:30 pm Your Time


 Earth Hour is a global action of solidarity, vision, and unification in the face of the ongoing climate crisis and loss of biodiversity. With the effects of climate change and global threats affecting more and more people, there has never been a more necessary time for us to come together to restore our rich biodiversity for a sustainable future for all.


Tonight, I'll join millions of people around the world to show support for protecting our planet. As a parent, I am often talking with my family about the importance of healthy, thriving ecosystems and communities. Now, more than ever, that conversation feels incredibly important. So, we'll be spending our time tonight during Earth Hour sharing stories about our favorite discoveries in nature and what we look forward to uncovering in the years to come.

Nature has always been such a calming and reassuring space for me. In these uncertain times, I've found myself seeking mediation in the sunlight, watching videos online of natural places, and taking short breaks to listen to recordings of waves crashing against our coastal shores. I hope you're taking extra care to stay safe and healthy for yourself, your loved ones, and those around you. It is a stressful and emotional experience as our daily routines change. Tonight, be sure to take a moment to recognize the importance and wonder of our natural world by joining the Earth Hour movement at home or online following CDC guidelines.

If you're active on social media, follow along on Instagram and Twitter to see how WWF supporters and staff are spending their hour using #EarthHour. Show us what Earth Hour means to you and how you’re participating this year by tagging us (@wwf_act) and using the hashtag too.

We've seen how powerful our collective impact can be. We need to come together as a global community for each other and our planet.

Sunday, March 22, 2020

From Tabula Rosa - Island Hopping

from whatis.com


island hopping
Island hopping, also called leapfrogging or pivoting, is a cybersecurity exploit in which an attacker gains access to an intended target by initially exploiting the employees and supply chain partners who have access to the target's network.

In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target. The term island hopping is inspired by a military strategy used in the Pacific theater during World War II.

According to Carbon Black's Global Incident Response Threat Report, 41% of all cyberattacks in 2019 were island hopping attacks. Generally, island hopping attackers pick employees, customers and smaller companies that work with the target organization, hoping that their cyberdefense will be weaker than the ultimate target.

Popular attack vectors include:

  • Watering hole exploits - the attacker infects a website that the target's employees are known to visit and infects their computing devices to gain access to the target's corporate network.
  • Social engineering - the attacker exploits the willingness of people to be helpful to compromise a downstream target. Once access to the downstream target has been established, the attacker might use phishing, business email compromise (BEC) or social engineering techniques to access the real target.
  • Reverse business email compromise (rBEC) - the attacker takes over the target's mail server and uses the compromised mail server to distribute bogus messages that appear to be legitimate.

To defend against island hopping attacks, security experts recommend taking the following proactive steps:

  • Use network segmentation and limit third-party access to network resources.
  • Require multifactor authentication (MFA).
  • Review logs for red flags that indicate lateral movement through the network.
  • Always assess third-party risks before signing contracts.
  • Create an incident response plan and periodically conduct exercises to ensure the plan will work.
  • Require that suppliers use the same managed service providers and technology stacks as the organization to make monitoring easier. Continue reading...

====================================


For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 



++++++++++++++++++++++++++++++++++++++++++++++++++++


Every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================