Welcome!

@CloudExpo Authors: William Schmarzo, Liz McMillan, Elizabeth White, Pat Romanski, Gopala Krishna Behara

Blog Feed Post

Five Lessons The League Can Teach Us about Cyber Security

Lessons from the hit show, The League

Internet Security and the Offensive Line

The 2013 NFL season kicks off tonight with the defending Super Bowl champion Baltimore Ravens visiting the Denver Broncos. For many of us, the start of football season means lazy chicken wing and pizza-filled Sundays in front of the TV. But, it also means it’s time to scramble together and pick your fantasy football team. If you participate in fantasy football, you may be a fan of the hit FX television show, The League which premiered last night. Don’t worry – there are no spoilers here. The League follows a group of old friends in a fantasy football league that seems to bleed into every aspect of their lives. Even if you don’t like fantasy football, or football for that matter, this show is likely to have you either laughing or turning away from the television in disgust at their attempts to make each other’s lives miserable. Aside from football, pranks, and Yobogoya, the show happens to teach us some good, not so obvious, lessons about cyber security. Read on for five lessons The League can teach us about cyber security.

  • Always Monitor

  • In football, players are constantly getting injured, traded and let go. In order to have a successful team you should be monitoring these updates as much as possible to make sure you choose the right players every week. When it comes to monitoring his team, Taco, Kevin’s obnoxious yet lovable brother, is notorious for not doing it. In fact, his lineup is usually decided by Kevin or his wife (and brains of the operation), Jenny, who simply want to keep him in the league.

    Keeping up-to-date with your fantasy team is similar to keeping your antivirus software up-to-date. New viruses are being released at a staggering rate and if your antivirus is using outdated virus signatures, the chances that your outdated AV software will detect the new virus is unlikely. Comodo Internet Security software makes monitoring a synch – it’s as simple as pressing a “Fix It” button when an update or scan is necessary.

  • Research From Trustworthy Sources

  • Kevin is helpless without advice from his wife, Jenny. He knows he needs help making his draft picks and trades but he gets lucky when he runs into the infamous Matthew Berry, an [actual] ESPN fantasy sports analyst. He enlists Matthew Berry’s help because he trusts his expert advice, but in the end, he doesn’t get to benefit from Matthew Berry’s advice because Andre harasses him when he thinks Matthew is hitting on his date.

    Just like Kevin used a trusted source for his fantasy football advice, you too should only visit trusted websites, especially when entering personal data in order to make online transactions. Websites that securely process your credit card information will have and extra “s” in the URL. So, instead Comodo and Internet Security of “http” you will see “https” in the URL while visiting secure websites. That’s because these websites have SSL Certificates to prove their authenticity. An SSL Certificate ensures that the website (or company) is authentic and safe for online transactions. Another way to spot a trusted website is to look for a trust seal which usually looks like a lock.

  • Use Secure Passwords

  • Taco is about as sharp as a marble so it’s not a huge surprise that he named his team, “Password is Taco.” Knowing Taco’s team name and taking an “educated guess” as to what his password is, another player could easily hack into his account and make unwarranted trades on his behalf. Though, he may not have the best of players to pick from since he doesn’t see the disadvantage to picking a kicker first.

    “I like kickers. They’re the toughest.” – Taco

    A strong password is fundamental to keeping your personal data safe. While a strong password alone will not protect you from being hacked, it can certainly help deter an attack. With the amount of personal information we post online (name, email, kids’ names, dogs’ name, birthday, etc.), we make it a lot easier for cyber criminals to decipher our passwords. Hackers often attempt to break into accounts by employing a “dictionary attack,” which involves using words straight from the dictionary to guess your password. Instead of essentially handing over your password by using easy-to-guess words, create them from a combination of letters, numbers, and symbols that would not be associated with a word found in the dictionary (or on your Facebook profile).

  • Don’t Let Fake Websites Fool You

  • Taco is certainly no Mark Zuckerberg but he did create the world’s first offline social network called “MyFace” where your face if your profile Don't let Fake Websites Fool Youpicture. The concept followed Facebook’s layout complete with a physical face wall, covered with outdated and awkward photos of his friends. He even created a “link” symbolized by a jewelry chain and you could literally poke or write on someone’s wall. In order to leave a message for one of his friends, he would break into their house while they were sleeping and leave a handwritten note. When his friends complained about the break-ins, Taco suggested they create a MyFace group, “People who don’t like getting their houses broken into at 4 AM.” Even though Taco’s MyFace required you to carry a corkboard-bound offline social network with you no matter where you went, he got a couple of others to join in on the fun.

    While you certainly wouldn’t mistake “MyFace” for the real Facebook, the concept of tricking people into using fake sites to steal their information happens every day. Cyber criminals deploy phishing scams in emails that entice you to click on what appears to be a link to an authentic website but actually takes you to phony scam site or legitimate-looking pop-up window. The good news is, if you fall for the scam and click through, there are some signs that alert you that the website is phony. For instance, sometimes the URL will have one different letter or one missing letter, such as www.facbook.com where you wouldn’t necessarily notice the missing “e” in the URL. Once you’re on the page that looks just like the legitimate www.facebook.com, you login and the cybercriminal has access to your password and other personal information. The consequences can be far worse if you fall for a phishing scam that takes you to a fake banking website. That’s why it’s best to never click on a link within an email from an unknown sender or enter personal information on a website that isn’t “https.”

  • It’s Easy To Catch A Virus
  • Andre had no idea what went down in his loft while the rest of the gang were supposedly making their draft picks. His final punishment for losing to Taco in the previous season was being banished from the next season’s draft. Unbeknownst to him, his other final punishment came at the same time while his so-called friends organized an adult video to be filmed in his apartment by Rafi, Ruxin’s revolting brother-in-law, and Dirty Randy, a shady Liberian/adult film maker.

    The gang planned to reveal this surprise to Andre after he lived in the soiled space for a few days. Suffice to say, his furniture needed to be burned after the event; however, Andre didn’t know and ate crackers off the couch used for the main scene. Once the act was committed, the scene of the crime was cleaned up just enough so Andre wouldn’t notice. When Andre invited the rest of the league over, he still didn’t realize that everyone was disgusted to even enter the place. Andre only found out about the punishment days after he had mysteriously contracted thrush through “immaculate infection”, a play on football’s “immaculate reception.” The point is, Andre wasn’t even a part of the video, yet he still got a virus because it’s that easy.

    Just like Andre didn’t go out of his way to catch a virus, he still ended up with one. You may think you’re keeping your device secure by steering clear of risky websites, but that’s not enough. Thousands of new viruses are created every day so keep your device secure with the proper antivirus protection.

    There you have it. If you learn from the five lessons The League can teach us about cyber security, you’ll have a much better chance at keeping your devices safe and secure from cyber criminals. Oh yeah, don’t forget to make your draft picks before it’s too late so you have a chance at winning the Shiva Bowl this season!

Read the original blog entry...

More Stories By Solar VPS

Solar VPS lives the Parallels "Optimized Computing" vision. It has created a virtual infrastructure from client offerings, data facilities and management offices. Solar VPS works very closely with Parallels to provide the highest possible service and support to customers.

@CloudExpo Stories
Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams. In his session at 22nd Cloud Expo | DXWorld Expo, Daniel Jones, CTO of EngineerBetter, will answer: How can we improve willpower and decrease technical debt? Is the present bias real? How can we turn it to our advantage? Can you increase a team’s effective IQ? How do DevOps & Product Teams increase empathy, and what impact does empath...
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis tool. It is an extremely lightweight tool that can integrate with pretty much any build process right now," explained Andrew Siegmund, Application Migration Specialist for CAST, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that's no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, explored how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He expla...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to close th...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, discussed how given the magnitude of today's application ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
You know you need the cloud, but you're hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You're looking at private cloud solutions based on hyperconverged infrastructure, but you're concerned with the limits inherent in those technologies. What do you do?
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...