Quality Management and Cyber Security
Website of Warren Alford

Warren Alford Quality Management, Risk Management, and Cyber Security

Welcome to my website where you will find valuable information about Quality Management, Risk Management and Cyber Security. I specialize in Quality Management Systems, Software and Network Cyber Security, Network Vulnerability Assessments, Risk Management, Risk-based Audits, and Quality booksQuality Management Integration (Abridged) by Warren Alford

Quality Management Integration explains quality management, quality improvement, measures and metrics, quality control, and audits.Quality Management Integration: Quality in Modern Business (Abridged) explains QMS principles such as quality management, effective quality improvement, meaningful measures and metrics, value-added activities, quality control, audits and reporting.

Buy Quality Management Integration: Quality in Modern Business (Abridged) by Warren Alford

Mission Statement: My mission is to connect people, places and ideas using quality management, risk management, cyber security, technology, education and training utilizing value-added interactive media sources. I strive to provide useful information to help keep you and your family safe.

Warren Alford.com is also your source for Quality Management training. This short video provides more information. You can also subscribe to my training videos on iTunes and YouTube. Enjoy!
Warren Alford.com Welcome Video

FDIC was hacked by China; CIO covered it up

FDIC was hacked by China

A report published by the House Committee on Science, Space and Technology found that hackers purported to be from China had compromised computers at the Federal Deposit Insurance Corporation repeatedly between 2010 and 2013. Backdoor malware was installed on 12 workstations and 10 servers by attackers—including the workstations of the chairman, chief of staff, and general counsel of the FDIC. But the incidents were never reported to the US Computer Emergency Response Team (US-CERT) or other authorities and were only brought to light after an Inspector General investigation into another serious data breach at the FDIC in October of 2015. Full Story
tags: FDIC, Federal Deposit Insurance Corporation, House Committee on Science, Space and Technology, hacking, backdoor malware

Omni Hotels Data Breach

Omni Hotels hit by point-of-sale malware

On May 30, 2016, Omni Hotels and Resorts discovered they were the victim of malware attacks on their network affecting specific point of sale systems on-site at some Omni properties. The malware was designed to collect certain payment card information, including cardholder name, credit/debit card number, security code and expiration date. Full Story
tags: Omni Hotels and Resorts, data breach, credit/debit card numbers, malware

Chinese Man to Serve U.S. Prison Term for Military Hacking

Accused of stealing plans relating to the C-17 military transport plane and F-22 and F-35 fighter jets, and attempting to sell them to Chinese companies.

A Chinese businessman who pleaded guilty in March to conspiring to hack into the computer networks of Boeing and other major U.S. defense contractors was sentenced to nearly four years in prison. The offender worked in conjunction with Chinese military hackers from the People’s Liberation Army Air Force to steal designs for cutting-edge military aircraft that are indispensable to our national defense. Full Story
tags: Chinese hacker, C-17 military transport plane, F-22 and F-35 fighter jets, Boeing

Cyber Security Alerts

Cisco Talos Reports Ranscam Crypto-ransomware

Ranscam malware reported by Cisco Talos Security Intelligence and Research Group

Ranscam deletes victim's computer files and then demands ransom to restore them or it will delete them. Yes, in that order. Ranscam further justifies the importance of ensuring that you have a sound, offline backup strategy in place rather than a sound ransom payout strategy.
tags: Ranscam, Cisco Talos, Crypto-ransomware, malware, ransomware Read More

Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS Critical Vulnerabilities

Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS critical vulnerabilities

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit for CVE-2016-4171 exists in the wild, and is being used in limited, targeted attacks.
tags: Adobe, Flash Player critical vulnerabilities, CVE-2016-4171, APSB16-18, Windows, Macintosh, Linux, ChromeOS Read More

Symantec Anti-Virus Memory Access Violation

Symantec Anti-Virus Engine susceptible to memory access violation

Symantec Anti-Virus Engine susceptible to memory access violation. The most common symptom of a successful attack would result in a Blue Screen of Death (BSOD).
tags: Symantec, Symantec Anti-Virus Engine, 20151.1.0.32, CVE-2016-2208 Read More

Quick Links
Myip Live Whois IP
DNS Leak Test
MAC Lookup
Ransomware Tracker

ISO 9001:2015 QMS Requirements

ISO certification bodies have three years to migrate certificates to the new ISO 9001:2015 versionISO 9001:2015 Released

The new version of ISO 9001 follows a new, higher level structure to make it easier to use in conjunction with other management system standards, with increased importance given to risk. ISO 9000:2015, which defines the concepts and language used throughout the ISO 9000 family of standards, is also released. You can find ISO 9001:2015 Transition Training here.

Stakeholders can now access the International Organization for Standardization’s (ISO) newly revised ISO 9001:2015 standard through the American National Standards Institute (ANSI); the ISO U.S. member body. These Quality Management Training Courses can help you manage and improve your business.

Most Popular Trending Pages

Risk-based Thinking ISO 9001:2015 QMS Requirements Video

Cyber Security

InfoSec Tools
Virus Removal
Google Chrome Cleanup
XFINITY® Speed Test
Malwarebytes PC/Mac
MS Windows Tool
Exploit Database
Kali Linux

Warren Alford ASQ Certified Manager of Quality / Organizational Excellence Warren Alford ASQ Certified Quality Auditor Warren Alford ASQ Certified Six Sigma Black Belt Warren Alford ASQ Certified Software Quality Engineer PMI, the PMI Logo, PMP and PMBOK® Guide are registered marks of Project Management Institute, Inc. ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems

Warren Alford Product RecallsWarren Alford Product Recalls

Email Warren

©2016 Warren Alford