Author Archive

Updating your Resume

Update your Resume As the weather warms up we will find much to do, but, don’t overlook the opportunity to update your resume. We make time to for many important tasks but we often forget to keep one of our best job...  [Read More]

FBI Warning about WordPress Applies to Small Businesses

FBI Warning about WordPress Applies to Small Businesses The FBI issued an alert April 7, 2015 regarding WordPress vulnerabilities. WordPress is a frequently used website software. Plug-ins, or add-on features, are common, allowing flexibility in design. A number of websites that use...  [Read More]

Insider Breach costs AT&T $25 Million

Insider Breach costs AT&T $25 Million AT&T is paying a hefty price – $25 million – for call center employees in Mexico, Colombia and the Philippines who accessed personally identifiable information from 278,000 customer accounts without authorization. The Federal Communications Commission says...  [Read More]

Webinar: Boardroom Implications Regarding Cybersecurity & Cyber Liability Insurance

Join us for a FREE webinar on May 20, 2015 from 1:00 pm to 2:00 pm (ET). Register for the event now. Cyber security has risen to the top of the list of risks faced by companies and organizations of all sizes in both...  [Read More]

Webinar: Social Media and Law Enforcement

Join us for a FREE webinar on May 26, 2015 from 1:00 pm to 2:00 pm (ET). Register for the event now. While the use of technology grows as both a resource for law enforcement to educate and as an outreach tool, it is also a...  [Read More]

Webinar: Introduction to Cybersecurity: Mobile & Wireless Security

Join us for a FREE webinar on May 27, 2015 from 1:00 pm to 2:00 pm (ET). Register for the event now. Mobile devices are uniquely susceptible to security risks since they are always on and accessible. They also provide several means of communication...  [Read More]

Webinar: Introduction to Cybersecurity: Network Security

On April 13, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Introduction to Cybersecurity: Network Security.” Network attacks put the confidentiality, integrity, and availability of data, systems, and services at risk. Network security is based on three elements: people, processes,...  [Read More]

Webinar: Information Risk Management in Healthcare: “At any cost…really?”

On April 8, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Information Risk Management in Healthcare: At any cost… really?” Recent data breaches and the high visibility around the changes in the threat, from internal to external, has generated a...  [Read More]

More Damage than Theft

More Damage than Theft A recent story in Reuters concerning cyber attacks should have IT administrators quite concerned. According the Reuters story, “A new survey of critical infrastructure organizations in North and South American carried out by Trend Micro for the Organization...  [Read More]

Recruiting, retaining cyber security talent key for federal government

The federal government will need to make cyber security talent recruitment and retention a key priority in 2015....  [Read More]