Software updates: why you shouldn’t ignore them
You know the drill. Your computer prompts you that there are software updates pending, but it just isn’t a convenient time. Maybe you’re in the middle of paying bills. Maybe …
Read MoreSecurity For All
You know the drill. Your computer prompts you that there are software updates pending, but it just isn’t a convenient time. Maybe you’re in the middle of paying bills. Maybe …
Read MoreSocial media has become something everybody uses in at least one form or another. Twitter, LinkedIn, Facebook, and many others are used by several million people every day, often several …
Read MoreShadow IT, a term that just sounds insidious. Surely it is something that governments use as a tool for state-sponsored cyber wars, right? The term suggests hidden technologies, lurking in the background. …
Read More(Post 10 of the 12-week Information Security Management blog series) You would have to be hiding under a rock for the past several years if you haven’t noticed the increased media …
Read More(Post 9 of the 12-week Information Security Management blog series) Choosing the appropriate risk management approach is a critical step in addressing and dealing with risk. If you have been following along, …
Read More(Post 4 of the 12-week Information Security Management blog series) If you are following along, last week I wrote about threats, risks, and vulnerabilities. I discussed the importance of identifying threats …
Read More(Post 2 of the 12-week Information Security Management blog series) When I ask people what they think is involved in cybersecurity, I almost unanimously receive a reply stating that its purpose …
Read MoreWhat do you think when you hear the terms “hacker” or “hacking”? Do you imagine a socially awkward, super smart nerd sitting in his basement using an incredible wealth of …
Read MoreTo small businesses, the threat of cyber-crime may seem like something only governments and big corporations need to be concerned with. To the contrary, small businesses are also vulnerable to …
Read MoreFor some, the word ‘cyber’ might conjure a sense of extreme geekiness and memories of cheesy movies involving unrealistic representations of computer crime, computer intelligence gathering, or secret societies using …
Read More