Drip Drip Drip

Drip Drip Drip It has been over a week now since word was released of the massive cyber breach at the Office of Personnel Management. At that time government officials claimed that... [ read more ]

Is China’s Hand in the Cookie Jar?

Is China’s Hand in the Cookie Jar? Yesterday the White House announced that massive amounts of personal information about federal employees had been exposed due to a breach of government data bases... [ read more ]

Mobile devices pose major cybersecurity threats

The bring-your-own-device trend presents huge cybersecurity risks, and many companies have not yet adopted the policies needed to ward off these threats.... [ read more ]

2015 Cyber Law Trends

2015 Cyber Law Trends The Georgetown Law’s hosted their third annual Cybersecurity Law Institute last week. The event was co-sponsored by the American Bar Association Cybersecurity Legal Task Force, Bloomberg BNA, and... [ read more ]

Social media savvy essential for corporate cybersecurity

If social media behavior is not taken into account when developing a cybersecurity strategy, a firm's employees may inadvertently increase the danger for both themselves and their companies.... [ read more ]

Aviation….. an important piece of the Critical Infrastructure

Aviation… an important piece of the Critical Infrastructure The federal government has deemed 16 sectors as critical infrastructure. They are transportation, water, energy, information, healthcare, government facilities, food, financial, nuclear, emergency services,... [ read more ]

Federal government increases its focus on cybersecurity

The U.S. government has recently begun to take concrete steps to help companies protect themselves and one another from the growing threat posed by cyber attackers.... [ read more ]

Growing cloud use presents new cyber security challenges

To embrace the cloud effectively and safely, both a well-crafted strategy and cyber security resources are essential.... [ read more ]

Just a Taste of Things to Come?

Just a Taste of Things to Come? The cause of today’s power outage in Washington DC has yet to be discovered, but early indications are that an explosion at a transformer may... [ read more ]

Earthquake Strikes and Cybercriminals Follow

Earthquake Strikes and Cybercriminals Follow By Dr. Jane LeClair It never fails that when disaster strikes someplace in the world, often before the dust even settles or the waters recede, scammers are... [ read more ]

Tips for Encrypting Data Files.

Tips for Encrypting Data Files Encrypting your data should be a part of your standard cyber security measures. Depending on how sensitive your business data is should dictate how thorough you encrypt... [ read more ]

More Damage than Theft

More Damage than Theft A recent story in Reuters concerning cyber attacks should have IT administrators quite concerned. According the Reuters story, “A new survey of critical infrastructure organizations in North and... [ read more ]

French TV5 Monde Hacked by ISIS

French TV5 Monde Hacked by ISIS The French-language television network TV5Monde suffered a prolonged outage in an attack claimed by ISIS’ “CyberCaliphate” group. While the details of the hack are still unfolding,... [ read more ]

Don’t be held ransom

Don’t be held ransom Many of us are all too familiar with viruses that infect our computers. We load our systems up with antivirus protection and hope we only get hit with... [ read more ]

Jibo the Family Robot, or Family Cybersecurity Nightmare?

Jibo the Family Robot, or Family Cybersecurity Nightmare? There’s a lot of buzz right now about a new “family robot” called Jibo. It is so interesting because Jibo has raised $2.29 million,... [ read more ]