Blog
Cyber Risk Analysis
A part of developing a cyber-secure environment involves evaluation of the possible risks facing the organization. This is a crucial component of your organization's incident...
How Important is AI to Cyber Defense?
Could artificial intelligence (AI) be the answer to fulfilling our cybersecurity job gaps? AI has become essential to cybersecurity. It has the ability to analyze...
Your Email Address is Personal
Your email address is one of the ways you connect with people electronically, and it can reveal a lot about you. Maybe it's as simple...
Smartphones and Hacks
Got a flip phone? Move on. This blog will be of no use to you. But if you are enjoying the benefits of holding the...
Data Privacy Day - January 28
In 2009, the US House of Representatives formally recognized Jan. 28 as National Data Privacy Day #DPD. Then, Congress took it further by declaring this...
Readjusting Your Cybersecurity Attitude
New Year. New Attitude. Now is the time to take a new look at your cybersecurity practices. Evaluate every aspect of your digital life. Check...
2021: Cybersecurity Year in Review
As we close the door on 2021 there's no shortage of noteworthy cybersecurity stories. Surly we will have learned from some of these incidents and...
Cybersecurity Prediction for 2022
Lather. Rinse. Repeat. This seems to be the theme for cyber incidents we will see in 2022. More of the same we experienced in 2021...
Understanding Copyright Law
The Digital Millennium Copyright Act (DMCA), enacted by the US government in 1998, regulates digital media by protecting it from copyright infringement by users on...
Dancing With the Devil: Ransomware Negotiations
Your important files are encrypted. Many of your documents, photos, databases and other files are no longer accessible because they have been encrypted. A document appears...
DoS, DDoS, TDoS
Denial of Service (DoS). This term is transparent. You want service, it's denied. In technology, a denial of service is a form of cyber attack....
What is a Zero-day Vulnerability?
Zero-day vulnerabilities are flaws in software security that the vendor has not yet created a patch to fix. Many zero-days are discovered by bug bounty...
'Tis the Season
The holiday season is upon us. The circumstances we are living in, COVID restrictions plus the high demand/low availability of products, will direct many to...
National Cybersecurity Standards
On Oct. 8, 2021, President Biden signed the K-12 Cybersecurity Act of 2021 into law. This law is a response to data security incidents that have...
Cybersecurity First
October is Cybersecurity Awareness Month. This week, the focus is on the importance of putting cybersecurity first. Why is cybersecurity important? Because it's everyone's responsibility. We...
Cybersecurity Career Awareness Week
Explore. Experience. Share. October is Cybersecurity Awareness Month. This week, the focus is on cybersecurity careers. Did you know:
- There are more cybersecurity jobs available than...
Fight the Phish!
October is cybersecurity awareness month. This week we will focus on phishing awareness. #BeCyberSmart Phishing is one of the most prevalent social engineering attacks. The attacker...
Cybersecurity: A Look Back Through the Years
Even before the Internet was a household name, cybersecurity was on the forefront of industry experts’ radar, and questions on how to keep the world...
#BeCyberSmart
October is Cybersecurity Awareness Month. This week we will focus on tips to keep you safe online.