Information about general information security issues.

Password Security Question Recommendations

/
It is risky to post security questions.  Security questions exist on pretty much every website that requires a username and password. 

Zoom enacts security and privacy control to prevent Zoombombing

/
On April 5th, Zoom turned on the passwords and waiting room features for meetings by default aimed at users of their free version and those with a single license version to help prevent “Zoombombing”.

What is Zoombombing and how to defend against it

/
Zoombombing is when an unauthorized person or stranger joins a Zoom meeting/chat session and cause disorder by saying offensive things and even photobombing your meeting by sharing pornographic and hate images.

The CMMC Accreditation Body signs MOU with the U.S. Department of Defense

/
The CMMC-AB is pleased to announce that it has mutually signed the Memorandum of Understanding (MOU) with the Department of Defense.

Setting up the root account on Kali 2020

/
If you would like to use root instead of the none superuser account kali, here are the instructions to do so:

Kali 2020.1 Default Username & Password – kali kali

/
In Kali Linux 2020.1, both the default user and password will be “kali”

Cybersecurity Maturity Model Certification (CMMC) Levels

/
The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive).

Understanding Cybersecurity Maturity Model Certification (CMMC)

/
So, if you haven’t heard or if you are not familiar with the cybersecurity maturity model certification (CMMC), don’t worry about it, we are here to explain it all to you.

September Is Insider Threat Awareness Month

/
That’s the theme of a new government program designating September as Insider Threat Awareness month. With it, SecurityOrb.com joins our colleagues in government, industry, and education to promote awareness of this critical threat to the nation and your organization.  Beginning next week, we will be making weekly posts on our social media pages on this topic to help us all stay vigilant in our security awareness and in protecting the data entrusted to us.

I’ve Been Hacked – What To Do After You’ve Been Hacked

/
By Carter Graydon at Hacked.com There’s nothing quite…