We should all be concerned!

Speaking on the topic of cyber terrorism, Loretta Lynch, the Attorney General of the U.S. is recently quoted as having said that “ISIS or any of our foreign enemies might develop that... [ read more ]

Car Hacked – Not Safe at Any Speed

The scenario is very frightening. You are making your daily commute to work at 55 mph when suddenly your car begins to accelerate uncontrollably. You step on the brake and nothing happens.... [ read more ]

Information Security in the Classroom

I have written several times about the experience of teaching information security in the classroom, both in the brick and mortar and online environments. My focus has always been on the student... [ read more ]

2015 Mid-Year Trends of Cybersecurity Threats to Small Businesses

In January I wrote about the forecasted cyber threat trends for small businesses. Now that we are half way through 2015, here is an assessment of how those trends have developed in... [ read more ]

Hello…this is your bank calling

Normally we don’t hear from the institutions where we do our banking. Occasionally they will mail out an ad that promotes a ‘loan sale’ and we might even receive an email about... [ read more ]

Drip Turns into a Flood

The cyber breach at the Office of Personnel Management (OPM) has finally resulted in the resignation of Katherine Archuleta as Director of that agency. According to news reports she offered her resignation... [ read more ]

Wacky Wednesday!

Planes are grounded! The Stock Market is closed! The Sky is falling!! With all the recent cyber attacks and computer glitches that seem to occur without hindrance, the news that United Airlines... [ read more ]

FTC Data Security Tools for Businesses

The Federal Trade Commission’s (FTC) primary focus is to protect American consumers. One of the many ways they do this is to provide education to businesses on topics such as data security.... [ read more ]

OK Google Not So OK by Dr. Jane LeClair

According to Peter Bright, “Not OK, Google: Chromium voice extension pulled after spying concerns” (June 24, (http://arstechnica.com), Google as done the right thing and pulled the extension from the Chromium/Chrome browser, following... [ read more ]

Drip Drip Drip

Drip Drip Drip It has been over a week now since word was released of the massive cyber breach at the Office of Personnel Management. At that time government officials claimed that... [ read more ]

Is China’s Hand in the Cookie Jar?

Is China’s Hand in the Cookie Jar? Yesterday the White House announced that massive amounts of personal information about federal employees had been exposed due to a breach of government data bases... [ read more ]

Mobile devices pose major cybersecurity threats

The bring-your-own-device trend presents huge cybersecurity risks, and many companies have not yet adopted the policies needed to ward off these threats.... [ read more ]

Social media savvy essential for corporate cybersecurity

If social media behavior is not taken into account when developing a cybersecurity strategy, a firm's employees may inadvertently increase the danger for both themselves and their companies.... [ read more ]

Aviation….. an important piece of the Critical Infrastructure

Aviation… an important piece of the Critical Infrastructure The federal government has deemed 16 sectors as critical infrastructure. They are transportation, water, energy, information, healthcare, government facilities, food, financial, nuclear, emergency services,... [ read more ]

Federal government increases its focus on cybersecurity

The U.S. government has recently begun to take concrete steps to help companies protect themselves and one another from the growing threat posed by cyber attackers.... [ read more ]