Less Than Suitable Security Invites Issues to Law Firm
It has been noted repeatedly that the persons intent on compromising company systems are not completing this endeavor for practice. Given...
Please Stop using WEP: Lesson from the Field
Recently I had the pleasure of attending GrrCON, a regional InfoSec conference in Michigan. The venue, talks, vendors, etc. were...
Machine Learning to Assist with InfoSec
Computers are rather adept at a large number of tasks, from the mundane to complex and dangerous. The users may want statistics applied...
Free workshops by FBI on Devastating Business Email Compromise Threat
Business Email Compromise (BEC) attacks can be financially more damaging that ransomware, for small businesses. These attacks have...
Everything is a Target: Solar Panels are in Play
Alternative and renewable energy sources have become more important and visible over the last few years. This is due to many factors,...
5 Top Resources for Small Businesses on National Cyber Security Month
October is full of special events and awareness programs. Some are tailored to be fun, like National Pizza Month and others are meant to...
Not to Silent Smart TVs
The number of connected devices has increased substantially in residences over the last five years. This makes people’s lives more...
Securing Hardware is not only a US Problem
Securing HaInsecure hardware is a massive issue for many parties. The insecure affects not only the individual or business as they use...
Medical Device Vulnerabilities: Medical Scanners Increase the Number of Vulnerable Equipment
Vulnerabilities with computer systems have been well-known in the industry over the years. The number and risk associated with these have...
October is Cybersecurity Month
For several years October has been deemed as cybersecurity awareness month. This has come about due to the realization by those with a...