Cybersecurity and HIPAA
The HIPAA regulation is a rather expansive regulation. With all of the aspects HIPAA has to note for the of the different environments...
Cybersecurity and Churches
As with so many other non-profits, churches likewise have been listed as a target for attackers. This issue has been exasperated due to...
Cybersecurity and Private Data
Data in its various forms have distinct value. The value is to the owner of the data in that if it were to leave the company in an...
Cybersecurity and Steganography
The act of hiding a message may be tracked historically at least to the time of Caesar with their rudimentary cryptography when sending...
Cybersecurity and Ongoing Issues
While our attention is focused these days on politics and other world affairs, cyber-attacks continue to occur. These attacks only...
Cybersecurity and Cybersecurity Month
In October we celebrate the annual observance of National Cyber Security Awareness Month (NCSAM). This annual event is brought about...
Cybersecurity and Connected Cities
IoT has been notable in the news over the last two years. The focus has been the connected home/lights turning on/off or colors,...
Cybersecurity and Hurricanes
This time of year hurricanes roar along the east coast of the US wreaking havoc across numerous southeastern states. Despite the loss of...
Cybersecurity, Drones and Small Businesses
Drones are being used for many creative tasks. They are now used to deliver packages and take-out. Pizza express, anyone? Cowboys may no...
Cybersecurity and Churches
By Charles Parker II As with so many other non-profits, churches likewise have been listed as a target for attackers. This issue has been...