Category Archives: Security Focus Blog

October is CyberSafety Awareness Month

Be wary of “skimmers” on ATMs, gas station pumps, and other machines with credit card readers. Skimmers are small devices installed over the normal reading slot. The skimmer reads your credit or debit card’s information. The crook then returns later to remove the skimmer and retrieve the stored information. Skimming devices are not always noticeable,…

5 Ways to Strengthen Your Cyber Security

Security First & Associates states  that when National Journal former Justice Department official Mike DuBose said, “Amidst all the concern and discussion over foreign hacking, what gets lost is the fact that the vast majority of serious breaches involving trade secrets or other proprietary or classified information are still being committed by insiders.” As I’ve…

Security Update on SOCIAL ENGINEERING

Did you know that Social engineering is the art of manipulating people so they give up confidential information? Criminals target individuals into giving them their passwords or bank information. They can also access your computer to secretly install malicious software which allows them access to your passwords and bank information as well as giving them…

WHAT’S THE DIFFERENCE BETWEEN Cyber Warfare and Cyber Espionage

Do you know the difference between Cyber Warfare and Cyber Espionage? Published reports about foreign hackers attacking major organizations should not be mistaken for cyber warfare. These attacks are acts of cyber espionage. CYBER ESPIONAGE  unfolds over months or years. CYBER WARFARE is different. The attack is usually quick, with strikes occurring within seconds and…

Do you know what WIIFM means?

Everyone wants everything NOW!  Not just you and me, I’m talking about EVERYONE. Why do you think diet pills are a million businesses? We want instant gratification. NO work, NO exercise, just melt away the fat away. This same philosophy is what everyone seems to want in the security business. They want INSTANT results with…

Security Alert – Page missing from a passport led to a bomb at airport!

Page missing from a passport led to a bomb at airport! DETROIT — When a Saudi Arabian airline passenger arrived at Detroit Metropolitan Airport weeks ago, red flags went up, landing him in jail. He had a pressure cooker in his luggage — a similar device was used in the Boston Marathon bombings. He gave…

Electronic Fingerprint Mandate

Electronic Fingerprint Mandate As of December 13, 2013 all agencies have transitioned to electronic capture and submission of a full set of fingerprints in support of all background investigations. This requirement extends to contractors cleared under the National Industrial Security Program (NISP). With an only an estimated 11% of current NISP contracts using electronic submissions,…

JPAS – eBook Reference Guide

It’s Finally Here! Yes, after all my promises for an eBook guide to help you through the ins and outs of the JPAS application, it’s ready for delivery. Let me begin by thanking you for your interest, support, and patience. As you may know, JPAS had been through many changes this year and I have…

Because we love you!

Today, I swayed away from my normal topics on this blog about Government Security Clearances, as I just wanted to say, Happy Valentine’s Day and Thank you for all you have done to help grow Security First & Associates.   With the New Year’s Day celebration over and No first of spring in site, It…

Security Insider Threat: Can You Protect Your Company?

Security Insider Threat:  Can You Protect Your Company? As a security professional, I am trained to never leave any rock unturned when it comes to exposing dangerous situations, which is why I often suggest that companies look inside their own walls as they try to protect the classified information they possess.  There has been an…