AceDeceiver-Minimal Opportunity for Infection, Yet Pertinent

With Apple devices, in general, the users are safe with their equipment from malware. In comparison to the competition, the Apple App store’s products do not have a significant amount of issues. The number of issues encountered by users is minimal. Over...  [Read More]

Understanding the 5 W’s & How of Cybersecurity

The first step to ensure cybersecurity success is understanding how it works. Developing a solution to a problem is difficult when the issue is clouded with confusion. And this is the case with cybersecurity.  It’s rare now to open a newspaper, scroll ...  [Read More]

An Update to Awareness

None of us likes the thought of becoming a cyber victim and a few prudent steps can help insulate us a bit more. While we can’t control the actions of every company we do business with we can be careful in how...  [Read More]

Xcode Malware

The Apple app store is well-known to be a safe place, relative to other app stores, for users to download apps. Time and again people have downloaded apps from ‘sketchy’ sites and found they have also obtained malware. However, as time has...  [Read More]

Even a Mouse Can Give You Issues

In residences and across the cube farms of countless offices, as people are checking emails and typing documents, regardless of the platform, one piece of equipment is omnipresent-the mouse. As these people click through the URL link or pages of a patent...  [Read More]

Cybersecurity – Control of Portable Media and Devices Part 2

Last week I provided an overview of portable media and noted that while it is convenient, it can also be a pathway for malware to enter a digital system. To protect your digital system and prevent this from happening here are some...  [Read More]

Interview with Jacqueline Tyo

In April 2016 and as part of the NCI’s IWICS, Dr. Jane LeClair hosted Jacqueline Tyo. Jacqueline is a program specialist with Girls Inc. of the Greater Capital Region that works collaboratively with its Executive Director, program staff, and administrators to deliver...  [Read More]

7 Tips for Cyber Secure Marketing

Savvy marketers know that trust is a strong component to marketing success. If you can develop a positive, trusting relationship with your customers, you will see amazing customer loyalty. In today’s high cyber risk environment, businesses should think about how to market...  [Read More]

Cybersecurity – Control of Portable Media and Devices Part 1

Portable media is anything that can be used to hold information in a form that a computer may read. This information can be manually exchanged between computer based devices. It can be magnetic tape, CDs, DVDs, memory sticks, flash drives, smart cards,...  [Read More]

Virtual Cyber Network Event: Alumni, Students, NCI Fellows, and Faculty (May 2016)

National Cybersecurity Institute at Excelsior College’s Virtual Cyber Network Event Alumni, Students, NCI Fellows, and Faculty May 19, 2016 from 12-1 PM   Join us May 19, 2016 for our third virtual cyber network event. Don’t miss the chance to be part of...  [Read More]