<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Cadre Blog

Never miss the latest in IT Security! Subscribe Now.

Tim O'Connor

Recent Posts

Myth Busted: Small Organizations are at Low Risk of Hacking Because they are not Desirable Targets For Hackers

All of these are common myths, but only one has dangerous misinformation. Can you figure it out?

  1. George Washington chopped down a cherry tree. 
  2. After you die, your fingernails continue to grow. 
  3. You don’t have to worry about your small business...
Read More

9 Questions You Should Ask When Considering Cloud-Based Tech

To paraphrase Zoolander, cloud-based technology is so hot right now. There are good reasons for that—cost, scalability, and convenience—but if you haven’t asked the right questions, you may face an unpleasant surprise later on. It sounds...

Read More

How to Improve Your IT Security for the Upcoming Elections

Small governments seem to be stuck between a rock and several hard places.

Read More

New Tools to Protect Credit Cards at Gas Stations But Who Gets to Use Them?

If you live in the U.S. and have ever noticed false charges on your credit card statement and had to call your bank to have your card canceled, chances are that you are the victim of skimming.  

Read More

If Your Healthcare Data is Leaked Chances are Your Doctor’s Office, not an Evil Hacker, is to Blame

New research from Michigan State and Johns Hopkins Universities show that failed internal information handling and negligence at healthcare providers’ offices accounts for more than half of personal health information (PHI) breaches.

Read More

New Advances Show Evil Hackers can use Cell Phone Apps to Capture your Information by Sound

Evil hackers and corporate spies have had the ability to record the loud tap-tap-tap of computer keyboards to decipher a log of keystrokes for years. The risk of losing your credentials to such a hack has been low because the attacker would have...

Read More

Research Suggests Your Battery Might be the Key to Thwarting the World’s Most Elusive Malware

Micro-architectural attacks are arguably the most dangerous and difficult of all forms of systems compromise to detect. Micro-architectural attacks leverage flaws in the chip hardware design of computer components. These kinds of flaws are...

Read More

5 Mistakes Made In the Capital One Breach and How to Avoid Them

If an amateur hacker could bring down a Fortune 500 company, how can your company hope to avoid the same fate? Take heart - from what we know at this point, it seems that Capital One overlooked some very obvious safeguards and there are a...
Read More

5 Starter Questions to Keep Your Smart Devices Secure

As the popularity of “smart homes” increases, new research continues to find concerns about the use of IoT (Internet of Things).

Read More

5 Lesser Known Impacts of Poor Security

You wouldn’t leave the doors to your business unlocked, would you? Of course you wouldn’t. In the same vein, companies go to great lengths – installing alarms and cameras and hiring security – to ensure their locations are physically secure. Yet...

Read More

Surprise on the Dark Web Underscores Need to Understand Security Technology

Author: Tim O'Connor

Impersonation, often called “spoofing” in information security lingo, is one of the most used and critical techniques in the toolboxes of both con artists and evil hackers. Evil hackers can impersonate people, equipment (such...

Read More

Security Trends and Takeaways for the Second Half of 2019

So much has happened in terms of information security and breaches in 2018 that it can be a little overwhelming. Now that we’ve had time to reflect on 2018, we can summarize important lessons and takeaways as we head into the second half of...

Read More

The Shadow Cloud Knows

Author: Tim O'Connor

You may have heard of “Shadow IT”. Shadow IT is the term that describes when employees install their own hardware or software without the approval or even the knowledge of the people responsible for supporting, approving,...

Read More

New Research Finds Flaws in Perceived Cyber Security; Visual Clues Sometimes Help

Author: Tim O'Connor

Encouraging employees to improve their security hygiene can feel like an endless battle. Sometimes it feels like having modern medical knowledge and time-travelling back to plague-ridden middle ages. That is why it’s a...

Read More

Why Security Won’t be the Reason You Succeed, but may be the Reason You Fail

At Cadre, we like to say that security isn’t the reason your company succeeds, but it could be the reason it fails. There’s a lot at risk when a company fails to implement a thorough and successful security eco-system and some companies will...

Read More

5 Ways to be Sure You’re not Over- or Under-Solving for Security

Remember the story of Goldilocks breaking into the three bears’ cottage and wreaking havoc? Goldilocks was eager to eat the porridge left by the bears, so she tried the first bowl and soon realized it was too hot. The next bowl was too cold, but...

Read More

Grab-n-Go Baldr Malware: A Stunning New Type of Malware

Author: Tim O'Connor

A revolutionary new type of malware toolset is starting to show up in dark web hacking forums. The new malware architecture is being called “Grab-n-Go”.

Read More

Why the Citrix Breach Happened and 6 Steps You Can Take to Protect Your Company

What happened?

Citrix, an American software company, disclosed a security breach in which hackers potentially exposed customer data. On March 6, 2019, the FBI contacted Citrix to advise they had reason to believe that cyber criminals had gained...

Read More

Did we miss China’s Quantum Sputnik?

Author: Tim O'Connor

On October 4, 1957 the Sputnik 1 satellite woke up the world and launched (pun intended) the Sputnik crisis, a period of public fear and anxiety across the Western nations. Until Sputnik 1, the western world had an ingrained...

Read More

Security Awareness Training FAQs

Author: Tim O'Connor

We receive a number of questions regarding security awareness training. Below are some common questions. 

What’s the best way to convince my management team to implement a security awareness program?                

A lunch...

Read More

5 Things to keep in mind when Implementing a Security Awareness Program

Author: Tim O'Connor

What are the 5 most important things to keep in mind when implementing a security awareness program?

  1. Adult Learning. A security awareness program is a waste of time and money if information is not retained and a positive...

Read More

Cadre’s Security Awareness Services Meet Requirements for Major Compliance Standards

Cadre’s Security Awareness class, course design and consulting services are now able to meet requirements for all major compliance standards.

Cadre’s cutting-edge security awareness offerings leverage fun adult-learning and neuroscience...

Read More

Honoring the Code Talker, Alfred Newman

Author: Tim O'Connor

This piece is honoring the hero, Alfred Newman.

Alfred Newman passed away yesterday at the age of 94. Mr. Newman was a key part of something extraordinary. He contributed to a tool more successful than the most powerful...

Read More

If you think Iranian and Russian disinformation memes are designed to change people’s minds and opinions, you might already be deceived!

Author: Tim O'Connor

Let me begin by saying I am not an expert on Iranian and Russian disinformation campaigns, although I have been researching them with great interest. What I do have is many years of experience in the information security...

Read More

Your ISP Potentially Knows EVERYTHING that you do through your Internet Connection

Q. Who knows more about your internet use then Facebook, Amazon or even your browser?

A. Your ISP and NOW they can collect and sell your internet usage information!

Q. How can you protect yourself?

A. Keep reading this blog!

Read More

How to Legally Practice Social Engineering

Category:   Security Awareness

Author: Tim O'Connor

Social Engineering is without question the most powerful and successful hacker skill of all time, but how can you become fluent enough in this skill to learn and defend...

Read More

Should we Fear the Amazon Echo or Other Smart Speakers in our Home?

Author: Tim O’Connor

I am a cyber security professional and when I tell some of my peers that I have several Amazon Echo smart speakers in my home and workshop they sometimes look at me like I just said Edward Snowden was my roommate or that I...

Read More