Wrangling and Securing IT Vendors

Wrangling and Securing IT Vendors OR Who Let the Intellectual Property Out? Who? Who? Who? Who? Who? No single vendor can provide every Information Technology need. I have worked with individual entrepreneurs and Fortune 50 companies, and none of them do it alone. Everyone needs outside vendors. The most basic needs require five vendors, and […]
Building A Better Democracy

Building A Better Democracy OR Secure Your Right…to Election Integrity Would you like a better democracy? Sure, we all would! So when I was recently asked how to build a secure voting system, I realized there are two schools of thought. 1. Find trustworthy people from all interested parties to both count the paper and oversee […]
Horror Stories – ZOMBIES!

Horror Stories – ZOMBIES! OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth or Backdoors? Well, the last refers to a different type of Zombie. These are the devices, either old or improperly configured, that devour your production Internet and network capacity or […]
Cybersecurity Basics – Daily Users

Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user levels. Last week I spoke to the novice. Today’s entry is for daily computer users. You use a computer, tablet, or mobile device for work, school, or home. You can […]