Blog posts by Jim Mundy

Category: Cyber

Perspectives from Channel Connect

In October nearly two thousand people descended on Orlando, Florida, for Intelisys Channel Connect. It is our biggest event of the year, and a great opportunity for our partners to level up their security game. My colleague, James Morrison, and I shared a few of our observations in a blog post over on the Intelisys site. Take a look!

Repelling a Ransomware Attack

I recently did an interview with Authority Magazine where I discuss ransomware, and I suggest five things you can do to protect yourself or your business. The interview also explores a bit about my career in cybersecurity, and some of my thoughts on leadership. You can find the article here.

When I talk to business owners and ask their biggest fear as it relates to cybersecurity, almost universally the answer is ransomware. And it’s no wonder – a ransomware attack can damage a business or shut it completely down. And businesses are not the only targets. Any of us can be the target of cyber criminals. I hope to explore the subject as it relates to protecting our personal computers and devices in the near future.

Cybersecurity in the Banking Industry

As you can imagine the banking industry focuses a lot of resources on cybersecurity. In my recent article for the West Virginia Banker Magazine I discuss a wholistic approach to the cyber threats faced by the banking industry. You can read the article here.

I should point out that the approach discussed can easily be applied to businesses in many different industries, not just the banking industry.

Table Stakes Security Services

I recently wrote an article for Cyber Defense Magazine discussing the minimal security products or services that a business, concerned about cybersecurity and protecting from bad actors, ought to have in place. I consider these “table stakes.” You can check out the article here.

Cyber Defense Magazine, is published monthly and shares a wealth of information to help you stay one step ahead of the next cyber threat.

SSL the Hard Way

I’m continuing the journey of building this WordPress site in a bit of a hybrid fashion. It is not an “easy button” method like WordPress.com or even a hosting provider’s managed solution. But I also didn’t start with a raw cloud VM somewhere and built the LAMP stack.

This day the big accomplishment is that I FINALLY was able to figure out SSL, get my SSL certificate created and uploaded, and get the sought after “closed lock” when arriving at this site via HTTPS.

SSL Lock Closed – Certificate Valid

It s not like I’m taking credit cards or dealing with any PII (personally identifiable information). But even for casual browsing many browsers now require, or favor, the encrypted connection via HTTPS.

The effort was a challenge. I could have gone with the quick and free auto-configuration option of a Let’s Encrypt SSL certificate. This method is offered by my current platform provider. I wanted to generate a key, order a certificate, install it, configure it, and launch it. I learn by doing. And hopefully you are now seeing the result of that effort.