The past year has been bad for infections. No, not the pandemic. The global plague of hackers, phishing scams, and ransomware. All those things were…
RANSOMWARE AND DISINFORMATION AND HOW THESE COULD BE MAJOR THREATS TO U.S. ELECTIONS
As we move closer to the U.S. elections the term ransomware is being used more within the media. Let me provide some clarity on the…
The CFAA, Arron’s Law, and Supreme Court Case for Nathan Van Buren: How Do They All Connect?
Law falls within three broad categories: criminal, civil, and administrative law. All three interact to form the complex web of the United States judicial system.…
Cloud Computing & SaaS: What You Should Know
Cloud Computing, it is incredible, right? It provides users with unlimited scalability, collaboration efficiency, and reduced IT cost. Furthermore, it has a positive impact on…
Defined: Phishing vs BEC
What’s the Difference Between BEC and Regular Phishing? The other day I was asked to partake in a “working group” about business email compromises also…
Cyber Stress: Fact or Fiction?
As an American who has traveled all over the world and has experienced the life of other cultures, I know we live in one of…
A Must-Read for Anyone New or Seeking a Career in Cybersecurity
Has anyone ever heard of an entry-level cybersecurity position? The answer is NO because these positions are golden unicorns – they don’t exist. Any position…
Big Data: What is it and How is it Protected?
Big Data is defined as a large amount of data that is unmanageable using internet-based platforms or traditional software. The Medical industry can be considered…
The Future: 5G
As the world progresses, it is only right that the network which connects us all does as well. The long-awaited fifth-generation mobile network has revolutionized…
Cyber Access Control & DDoS Attacks
Access control is a security process that regulates a user’s ability to connect to different systems or networks. While our accessibility is increased through cyber…