Apple Privacy and Security Myths
Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
Cyber Defense – Empirical Education
Cyber Defense – Empirical Education OR Bloody Do-Gooders! Your business has grown to an empire, and the barbarians of cybercrime threaten it! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, pillaging your data, money and trying to erase you from the landscape. You need a cyber defense […]
Cyber Defense – Kingdom Policies
Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]
Unlocking the Cybersecurity Insurance Questionnaire
Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]
Cybersecurity Foundations – Risk Assessment and BIA
Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA). The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but […]
A One-Sided Cyberwar with Russia
A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes? What has possessed the superpowers of the world into this standoff? Beijing won’t stand by idly if things get hot, but not likely before the Olympics end on February 20th. […]
Cybersecurity Basics – Tech Lords
Cybersecurity Basics – Tech Lords OR My Other Car is a Police Call Box This three-part series covers the basics of cybersecurity for three different user levels. The final entry speaks to the administrators, the technical gurus that keep data flowing and businesses running. What wisdom can possibly be imparted upon such tech heads that they don’t […]
Cybersecurity Basics – Daily Users
Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user levels. Last week I spoke to the novice. Today’s entry is for daily computer users. You use a computer, tablet, or mobile device for work, school, or home. You can […]
Cybersecurity Basics – Novice
Cyber Security Basics – Novice OR Grandma’s Got a Brand New Smart Bag This three-part series covers the basics of cybersecurity for three different user levels. The first is the novice technologist – those who wouldn’t use the technology if it wasn’t so darn convenient. The next category is the daily user – you check […]
Ransomware Survival – Part 3
Ransomware Survival – Part 3 OR Live, Work, but Don’t Repeat I had to plug in my Serious Keyboard for this post. When the dust settles and some semblance of normality has returned, it is time to understand what happened, how it happened, and how to prevent or mitigate a repeat. However, many small to […]