CyberSecurity Musings The Colonial Pipeline Hack Was Avoidable The Colonial Pipeline hack is now making the news and many cyber security experts are providing their take on how Mobile telephony is dying [Published in iPswitch] Verizon, AT&T, T-Mobile–I hope you are reading this. Mobile telephony, your primary business model of enabling phone calls and text Data Security In The Cloud: Part 2 [Published in iPswitch] Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting Data Security in the Cloud: Part 1 [Published in iPswitch] The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT Why do we still teach our children ABC? [Published in Medium] “Why do you teach me ABC?” My precocious preschooler pointed to the virtual QWERTY keyboard on the tablet: “Why not COVID-19's Lessons About Social Engineering [Published in Dark Reading] Unless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases Improving Everyone’s Ability to Work from Home After the Pandemic [Published in IPSwitch] Two out of three Americans with jobs are already working from home because of the pandemic. Many will have to Stopping the Dark Triad from impacting our response to COVID-19 [Published in IPSwitch] Last week, New York City Mayor Bill de Blasio warned residents of a widespread Twitter and text-message circulated misinformation campaign It's 2020: Do we need more cyber hygiene? [Published in InfoSecurity Magazine] This month we learned that a US maritime base had to be taken offline for more than 30 hours because How much cyber hygiene do you need? [Published in Medium] Cyber hygiene: the term that is evoked whenever there is a threat to our infrastructure, a ransomware attack, or any data breach. It « Previous 1 2 3 4 5 Next »