SecTor 2020, Canada’s Biggest Cybersecurity Event: Day Two

November 9, 2020 | Kim Crawley
Kim Crawley

Kim Crawley

Kim Crawley spent years working in general tier two consumer tech support, most of which as a representative of Windstream, a secondary American ISP. Malware related tickets intrigued her, and her knowledge grew from fixing malware problems on thousands of client PCs. Her curiosity led her to research malware as a hobby, which grew into an interest in all things information security related. By 2011, she was already ghostwriting study material for the InfoSec Institute’s CISSP and CEH certification exam preparation programs. Ever since, she’s contributed articles on a variety of information security topics to CIO, CSO, Computerworld, SC Magazine, and 2600 Magazine. Her first solo developed PC game, Hackers Versus Banksters, had a successful Kickstarter and was featured at the Toronto Comic Arts Festival in May 2016. This October, she gave her first talk at an infosec convention, a penetration testing presentation at BSides Toronto. She considers her sociological and psychological perspective on infosec to be her trademark. Given the rapid growth of social engineering vulnerabilities, always considering the human element is vital.

April 24, 2020 | Kim Crawley

Deep web criminal activity and dark web news: prevention strategies explained

Sir Tim Berners-Lee invented the World Wide Web in 1989, and then it became available to the general public by 1991. The web is an internet service that was designed to help scientists and academics exchange information more effectively. But by the late 1990s, the web helped to make the internet popular and accessible to ordinary people all over the world. Over…

April 14, 2020 | Kim Crawley

Can incident response be fun?

This blog was written by an independent guest blogger. Cyber attacks are unfortunately inevitable. It’s important to security harden your networks as much as possible. But your organization must also be prepared for incident response. Effective incident response involves an awareness of various cyber risks and threats, having a plan to respond to the various ways they manifest,…

Get the latest
security news
in your inbox.

Subscribe via email

RSS

March 26, 2020 | Kim Crawley

What is cloud asset management?

It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters, the HVAC people to keep everything cool, and the massive electricity bills to keep all of that going. …

March 19, 2020 | Kim Crawley

Insider attacks and insider threats in cyber security explained

Organizations usually focus on cyber threats which are external in origin. These include anti-malware, external firewalls, DDoS attack mitigation, external data loss prevention, and the list goes on. That's great, external cyber attacks are very common so it's vital to protect your networks from unauthorized access and malicious penetration. The internet and unauthorized physical access to your facilities…

March 3, 2020 | Kim Crawley

How honeypot works: reviewing honeypot security traps

If you’ve ever had an ant problem in your home, it’s likely that you’ve used ant traps. Ants are attracted to food high in carbohydrates, especially sugary stuff. Ant traps work because they contain bait that lures ants in. So, they might go for your ant trap rather than the cookie crumbs you dropped…

February 26, 2020 | Kim Crawley

DDoS acronym explained: what is distributed denial of service?

Your favorite website goes offline. That firewall in your office network isn’t filtering anything and is overwhelming the server machines that it is connected to. If an LDAP port is hit by a DDoS attack, you have no Active Directory securing the user accounts on your Windows client PCs. Maybe an IMAP server was hit,…

February 25, 2020 | Kim Crawley

How to harden your employees from the massive social engineering threat

This blog was written by an independent guest blogger. Social engineering is the art of human deception. In the world of cybersecurity, it’s how to fool human beings in order to conduct cyber attacks. Some of these cyber attacks can be very expensive to your business! In fact, many of the worst cyber attacks to your organization&rsquo…

February 20, 2020 | Kim Crawley

Is the cybersecurity skills gap real?

An independent guest blogger wrote this blog. If you do a web search for “cybersecurity skills gap,” you’ll get many, many pages of results. It’s certainly a hot topic in our industry. And it’s a matter that security practitioners and human resources people often disagree on. But before I get further into…

February 4, 2020 | Kim Crawley

How do firewalls work? Firewall technology explained

Firewalls are one of the most important network security functions that everyone must have, whether you're operating a datacenter, or surfing the web on your phone during your public transit commute. Firewalls come in both hardware and software forms, for both consumers and enterprises. So what do firewalls do, and how do they work? I’m sure you…

November 29, 2019 | Kim Crawley

SaaS Security Best Practices to Keep in Mind

Software as a Service (SaaS) is huge. More and more developers are choosing SaaS as the delivery mechanism of their software and services, and more and more businesses are using it. Where you or your organization have internally-developed, SaaS-delivered applications, ensuring the security of those applications is critical to both the security of the data, and minimizing risks to your…

November 19, 2019 | Kim Crawley

The surprising truth about cybersecurity and autism

This is a guest blog by Kim Crawley. I’ve worked in cybersecurity for about a decade, but I’ve been autistic for my entire life. Careers usually start in adulthood, but autism is something children are born with. And contrary to what some people assume, autism doesn’t disappear at age 18. Autism is for life. Unfortunately,…

November 8, 2019 | Kim Crawley

What is Vulnerability Management?

All software and hardware has vulnerabilities. So do the non-computing aspects of your organizational security, such as the physical security of your building or how susceptible your employees are to social engineering. Vulnerabilities are everywhere and are in everything. The key to good security is to know how to manage your vulnerabilities. What are they? Where are they? How can…