Interceptor, High Tech Hackers are in the Towers!

Well, there is someone intercepting your data while you drive along in your auto on the interstate. Who? Well, we don’t know that answer! Yes, it has been reported that there are... [ read more ]

Trust Us. . . . No Data was Lost

Word comes today that HealthCare.gov has been hacked by a person or person’s unknown. Reports indicate that the initial breach occurred in early June but went undetected until recently when IT specialists... [ read more ]

Home Depot Repairs after Cyber Attack

Yet another retailer has been hacked and everyone involved in the incident is scrambling to determine the amount of damage done. Home Depot announced Tuesday that it is cooperating with investigators to... [ read more ]

Beware of Clicking that Destination on the Map!

Okay, everyone uses Google Maps. It is because we do not want to get lost trying to get to our destinations. However, what if there is a particular destination in which you... [ read more ]

The Plight of Exhuming or Burying Digital Remains

As concerns over digital privacy grow there has been much debate on the digital past-life of the now deceased. How does one access once private accounts well protected by users when alive... [ read more ]

Cyber Lite….or Just Right?

Recently Michael Daniels, the cyber security czar for the Obama administration openly admitted during an interview with GovInfoSecurity that his technical expertise in the digital domain was very limited. Timothy Lee in... [ read more ]

Law Firms Not Exempt from Cyber Breaches

Nearly every organization is subject to cyber attacks and the loss of sensitive information that can result. Law firms are no exception. A great deal of sensitive material is naturally kept within... [ read more ]

Health Care Breach Affects 4.5 Million Americans

The relentless assault by hackers on the cyber systems of the nation continues to escalate as news comes of yet another cyber breach that will affect millions of Americans. According to just-released... [ read more ]

Congress Takes Action on Cyber Bill

It’s a bit of a rarity these days when Congress is able to compromise on legislation. However, on July 28 the House passed H.R. 3693, a bill known as the National Cybersecurity... [ read more ]

Handle Sensitive Information Differently

If you have highly sensitive information, think about an entirely different way of handling it from your normal email, collaboration, and other systems. If it is the kind of information that can... [ read more ]

Use USB Only for Personal Use!

I saw some great advice in an article about USB – pretend they are your toothbrush and share accordingly. USBs are amazing devices and the amount you can store on them is... [ read more ]