Cyber Defense

CloudTech1 Sept. 21 Free Lunch And Learn: Network Security

ROCHESTER HILLS - Join CloudTech1 University at its Education Center on September 21st at 11am to enjoy some food, to have some fun and learn about Network Security, a strategy no business can afford to ignore. CloudTech1 University has become an ideal place to learn cloud basics and ask questions about the security of your

By |2016-09-09T17:01:13-04:00August 11th, 2016|Cyber Defense|

M2 TechCast: Beckers Talks Disaster Recovery Event Aug. 23 At Automation Alley

ROYAL OAK - Rick Beckers, CEO of CloudTech1, talks about his brain child, the CloudTech1 University. His company is a managed service provider that evolved into a cloud service provider. So he wanted to help folks understand all about the cloud and what it can do. In June he launched his CloudTech1 University to teach

By |2016-08-10T15:34:59-04:00August 10th, 2016|Cyber Defense, Featured, M2 TechCast, Podcasts|

Understanding New Hacktivism: Where Next for Hackers With a Cause?

LANSING - In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving

By |2016-08-08T22:36:49-04:00August 8th, 2016|Cyber Defense, Guest Columns|

CloudTech1 University’s Next Showcase – Business Continuity And Disaster Recovery

TROY - Managed service provider CloudTech1 on Aug. 23 at Automation Alley headquarters will be discussing Business Continuity and Disaster Recovery. A disaster doesn't have to be a disaster.  Disasters happen. It is part of life. Hopefully you and your company never have to go through one. The key is preparedness. How do you prepare and

By |2016-08-04T12:58:12-04:00August 4th, 2016|Cyber Defense, News|

Report: Keysniffer Hack Can Detect Passwords From Wireless Keyboards

SAN FRANCISCO - Using an attack that researchers at cybersecurity firm Bastille are calling "keysniffer," hackers can detect every key you press on your wireless keyboard. Think about that next time you’re using your laptop in a coffee shop. That means they can pick up your passwords and maybe the answers to your security questions,

By |2016-07-28T16:32:43-04:00July 28th, 2016|Cyber Defense|

Obama Makes FBI Lead Government Agency To Respond To Cyberattacks

WASHINGTON DC - Who's in charge of responding to "cyber incidents" in the US? As of today, it's the Federal Bureau of Investigation. President Barack Obama outlined a new policy for responding to cyberattacks on both the government and US industry on Tuesday, making the FBI the lead agency regardless of where the attack seems

By |2016-07-28T16:12:43-04:00July 28th, 2016|Cyber Defense, Politics|

Internet Advisor: Lohrmann Provides Michigan Cyber Militia Update

DETROIT - Dan Lohrmann, led Michigan’s cybersecurity and technology infrastructure teams from 2002-2014, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. During that time he was involved in crafting the state’s response to the tidal wave of cyber attacks that grew bigger and more vicious.

By |2016-07-27T15:59:30-04:00July 27th, 2016|Cyber Defense, Internet Advisor, Podcasts|

Putin’s Russian Hackers Behind Wikileaks Democrat National Committee eMail Dump

WASHINGTON DC - Reports surfaced over the weekend that points squarely at a Russian intelligence group that was the source of the most recent Wikileaks email dump - this one aimed at influencing the U.S. election. Cybersecurity experts confirmed - based on digital forensic evidence - that a hacking group backed by Russian President Vladimir

By |2016-07-26T19:03:45-04:00July 26th, 2016|Cyber Defense|

US DOT Secretary Foxx Detroit Auto Cybersecurity Speech Now Online

DETROIT - U.S. Transportation Secretary Anthony Foxx’s speech at the inaugural Billington Auto Cybersecurity conference last Friday at Cobo Center is now posted online for you to watch. Highlights of his speech include: The US DOT will soon (weeks perhaps months) be issuing its own report on auto cybersecurity and the threats posed by the

By |2016-07-25T20:42:16-04:00July 25th, 2016|Autonomous Vehicles, Cyber Defense, Featured, Politics|