Quality Management

The Digital World of Challenges

Digital business exposes organizations to new threats and risks everyday. Today’s security and risk practitioners face unprecedented challenges due to the volume and velocity of digital interactions. Tools and techniques of yesterday are not consistently effective in the ever-changing digital world. Cybersecurity Ventures predicts global cybersecurity spending will exceed $1 trillion from 2017 to 2021. By 2020, more than 33% of attributable nation-state hack attacks will be perpetrated by freelance hackers. By 2019, the demand for cybersecurity professionals will increase to approximately 6 million globally. With such unprecedented growth, the cyber community is facing a unique set of challenges. Cyber Security professionals are on the frontlines of a real battle. According to the Bureau of Labor Statistics, the rate of growth for jobs in information security is projected at 37% from 2012–2022, faster than the average for all other occupations. This website provides resources for the InfoSec community including vulnerability assessment, risk management, penetration testing, information system assurance, quality management, incident handling, and offensive / defensive cyber measures.

"Did you know.......?"
#1 - Network breaches by cyber attackers average 160-180 days before being discovered by the victim.
#2 - Many attackers target what is considered the easiest point of attack (POA): People.
#3 - The majority of these attacks go unreported.

Blog post: Has Your Computer Been Hacked?

Password Practices

Creating strong passwords is daunting, especially when you have numerous accounts to protect. Anyone would be intimidated if they had to memorize multiple passwords like Z24!-79re-B"3^S. As a result, you may be using one password for your accounts or you follow best practices for passwords however, they are simple words that could be easily guessed. Even if you are taking the right steps by using multiple hard-to-guess passwords, if you write them down you are exposing your passwords.

Get the Tor Browser

Tasty Onions

You will need the Tor Browser to access the links below.
The MH Desk Reference
Deep Dot Web
Candle Search

Email Warren

Valid RSS for Warren Alford.com
Certificate for Warren Alford.com


©2017 Warren Alford