5 Blogging Tips to Stay Constant

Running out of blog topic ideas can be a bummer, but it can also be kind of exciting. Exciting, because it’s a chance to come up with a bunch of fun, new ideas to talk about. A bummer, because brainstorming enough topics to last you for a couple of months can be difficult and time-consuming. […]

Read More »

How To Continue to Fight for Online Privacy

As Americans spend more and more time online and on their devices, they also want to see increased privacy protections. Last year, the Federal Communications Commission made a move in that direction by enacting strong privacy rules giving broadband customers more control over data collected by their internet service providers. Unfortunately, on April 3, President […]

Read More »

Closing the gap between breach and discovery

In a perfect world, we would have a similar level of awareness and sensitivity when it comes to being cyber-attacked as when we are physically attacked. Our system receptors would fire the moment a hacker successfully breaches our defenses, and we would immediately spring to action. Unfortunately, this is not the case with most enterprises. […]

Read More »

The strange new world of hiring and employee tracking

Your employer wants to hire top salespeople and is counting on HR to deliver the best. There’s the old-fashioned way: collect resumes, sort for keywords, check on social networks, get referrals and interview. But what about geotagging? Employers often have “top performer clubs” for their salespeople. Incentives for these top performers usually involve rewards such […]

Read More »

5 Steps for Securing Health-Care Networks

If you’re a small healthcare IT operation, a simple spreadsheet might do the trick. If you’re larger, a not-so-simple spreadsheet might be in order. Regardless of how you do it, hospitals, clinics and other healthcare organizations must identify and monitor every single instance of computer network access. They’re called endpoints, says Larry Ponemon, founder of […]

Read More »

Cyber risk – a view from the Boardroom

A problem for Board members though can be penetrating the tech-speak so common in the cyber world so they can look squarely at the risk, ask the right questions and ensure they are making the right decisions. With so much at stake, I wanted to share a framework that may help company directors think about […]

Read More »

7 Topics To Never Search on a Work Computer

You don’t want to become an office cautionary tale — that person who got fired because they were busted Googling something inappropriate during an all-hands meeting When you’re on your work computer, your employers can track pretty much everything you do. “Any personal data or behavior done on any work device can and is collected […]

Read More »

38% of consumers affected by ransomware pay up

Since the beginning of 2016, ransomware has gone from a relatively exclusive category of malware utility to a mainstream destructive tool used in wave after wave of phishing attacks against individuals and companies alike. Ransomware is now so widespread that it cost businesses a total of $1 billion in 2016, according to a new report. […]

Read More »

The 3 B’s of Cyber Security

Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack. In the last year, half of American small businesses have been breached by hackers. That includes […]

Read More »

What’s New in this Windows 10 Privacy Update

Windows 10 privacy is a contentious issue. This is in part because Windows 10 is integrated with cloud-based features like Cortana, and it has features influenced by mobile such as determining your location. Then there’s Microsoft’s more questionable goals, like scooping up diagnostic data and gathering information for better ad-targeting. In previous versions of Windows […]

Read More »