Too often, the internet is mentioned in the context of cybersecurity intrusions, deplorable digital scams, and less than flattering memes. Occasionally though, it’s a place where good things happen too. […]
Best Practices: P@ssW0rd 101
If you’re anything like most people I know, you hate passwords. The only thing you likely hate more than passwords is the requirement that security conscious sites employ enforcing minimum […]
Covid-19 Notifications Set to Cross State Lines
As reported by the Associated Press (AP), residents in 17 states will soon be able to receive notifications both in their home states and across state lines. For several months […]
Digital Parenting: It’s about child safety, not just parental control
Ten years ago, a 10-year old with a smartphone was the exception. As we approach 2021, it is now becoming a norm. The fact that respected technology publications like PCMag regularly update […]
COVID-19 Spearphishing Scams: Business as Usual for Cybersecurity Professionals
This week, IBM published a report advising of positive identification of cyber attacks targeting executives in organizations and companies with a role in impending COVID-19 vaccine distribution. Energy and manufacturing […]
In Network Infrastructure Security, Technical Bells and Whistles are not Enough
When we hear the term infrastructure, what generally comes to mind are physical structures that support an industry or a city. Common instances of infrastructure are those supporting transportation, government, […]
Supply Chain Management and Cybersecurity: Is there a relationship? (Spoiler Alert: COVID-19 = Proof of Concept)
The importance of an effective supply chain management cannot be overstated. Simply expressed, it is the process through which companies seek to maximize profit and overall success through the timely […]
All Corona Virus Posts are not Equal
Over the past several months, it has become hard to ignore. COVID-19, or as its more commonly known, the Corona Virus, is everywhere. This seems to be true not just […]
Who And Where (and What) is TikTok (Doing with Our Data)?
In the past year, TikTok has typified Gen Z’s Social media use. With more and more children getting mobile devices at a younger age, the demographic has demonstrated its preference […]
Hacking Outside the Box – VPN as an Attack Vector
In early February of this year, it became public knowledge tjhat hacking groups based out of the country of Iran were actively exploiting vulnerabilities in Virtual Private Network (VPN) software. […]