Security Experts:

Terry Cutler's picture

Terry Cutler

Terry Cutler is a co-founder of Digital Locksmiths, an IT security and data defense firm based in Montreal and serves as the company's Chief Technology Officer and Certified Ethical Hacker. Prior to joining Digital Locksmiths, he was a Premium Support Engineer for Novell in Canada where he analyzed network vulnerabilities and transitioned security technologies into production. In addition to being a licensed private investigator in Canada, Terry is an internationally known author, trainer, speaker, and security consultant, Terry has appeared in numerous national television and radio programs and is very active on the conference circuit. Follow Terry on Twitter at @TerryPCutler

Recent articles by Terry Cutler

  • The question most asked throughout 2011 was, “is this the year with the most hacks?” There is no straight answer. I think the best way to answer the question is to pose another question.
  • I believe the recent Facebook hack is more than gruesome pictures and pornography. There may be a large “footprinting” element at work.
  • It’s 3:10 a.m. and your home phone rings. You've been hacked, and it's time to respond. Your proactive approach should not become reactive, and now is the time to check your ego at the door and kick it into high gear.
  • Being aware of the methods used by hackers is an important step towards defending attacks on sensitive company data. Understanding hacker “know-how,” in conjunction with appropriate defense and countermeasures, will help identify potential threats to a company’s network.
  • Being compliant doesn’t mean you’re secure. Ethical hackers are continuously schooling larger companies, and even with their large budgets, why are they not getting the message? Buckle your seatbelts; The Hacker’s fun has just begun.
  • It used to be “loose lips sink ships” but these days when it comes to keeping company information under wraps, it’s “slack security sinks companies.”
  • If a company wants to make the most of social networking, they need to be aware of the security risks in order to stay ahead of the hackers.
  • There is no way to stop a hacker, we can only make it harder. If a new authentication mechanism is hard to break, they'll bypass the security by trying to locate a weakness somewhere else in the system.
  • It appears that Canada’s Finance, Defense Research and Development departments, as well as the Treasury Board, were hacked back in February. Although confirmation is pending, the attack seems to be the work of patriot hackers, using computer servers based in China.
  • Compliance doesn’t mean you’re secure; it’s a baseline to say that you’ve done an average job at securing the enterprise.
  • Botnets are insidious. They spread like digital weeds and infect thousands to tens of thousands of machines at a time. Here's why your organization should be utilizing Security Information and Event Management (SIEM) Systems to ferret out botnet infections.
  • By focusing on these security priorities, you’ll be in the best position possible to navigate securely through new and cloudy IT waters, as well as defend yourself against whatever the world throws at your enterprise.
  • More people are flocking to their smartphones and tablets, leaving their notebooks behind. Attackers are certain to try to profit from this trend.
  • Attackers are getting more sophisticated; here's an example of how they work and insight on how to stop them.