Background On January 22nd, 2016, the Food and Drug Administration released a draft guidance document titled “Postmarket Management of Cybersecurity in Medical Devices”. (Food and Drug Administration). This important document addresses the need for security throughout the lifecycle of several medical devices. Improving medical device security is a subset of President Obama’s February 19th, 2013 […]
ABC11 Stern Security’s owner, Jon Sternstein discusses a cyber attack in Cary, North Carolina affecting the state’s largest K-12 school system. To see the full article, go to: http://abc11.com/technology/cyber-expert-weighs-in-on-panther-creek-hack-attack/1072223/
11th Academic Medical Center Security & Privacy Conference Hosted by North Carolina Healthcare Information & Communications Alliance, Inc. (NCHICA) Implementing Multi-factor Authentication for Clinical ApplicationsPanel Leader: Todd Greene (Carolinas HealthCare), Panelist: Jon Sternstein (Stern Security) June 22-24, 2015 The Friday Center, Chapel Hill, NC
All Apple users need to enable two-step verification on their iCloud accounts if they have not already. This protects your account by confirming your identity through a text message in addition to your password. So even if someone steals your password, they would need to steal your phone as well to get into your iCloud […]

What is the most important account that you own?…. Most people would say it’s their bank account, but many underestimate the value of their email account. If someone gets access to your email account, they can often access all of your other electronic accounts including your bank, LinkedIn, Facebook, Amazon, and more. With access to […]

Background How can an attacker capture usernames and passwords on a local network by simply waiting for the computers to willingly give them up? LLMNR and NBT-NS poisoning! Link-Local Multicast Name Resolution (LLMNR) and Netbios Name Service (NBT-NS) are two components of Microsoft Windows machines. LLLMNR was introduced in Windows Vista and is the successor […]