February 28, 2017
Many inputs to computers

Don’t be asleep at the wheel, Big Data privacy issues are critical for businesses and individuals to grasp

By now, you’ve probably heard the term “Big Data”, and may even be getting sick of hearing about it. Whether you’re new to it or not, […]
February 14, 2017
Goldfish with hooks around

Why do so many people click on phishing email messages?

Your UPS delivery was missed… The IRS says you owe them thousands of dollars… You’ve reached your computer disk storage limit… Your Apple account information has […]
January 16, 2017
Safe with USB cables

Working with extremely sensitive data

A friend of mine is developing some complex software that he hopes to license to other companies. When I asked him how he was protecting it […]
January 1, 2017
Collage of computers and users

Attacks on prominent businesses show how industrial and economic spies are targeting and finding valuable intellectual property

While most of the cyber crime news stories focus on financial and personal information theft, there is clear evidence emerging that large-scale espionage is being conducted […]
January 1, 2017
Let's make a deal doors

When Popcorn Time ransomware offers you Door #2, don’t choose it

Ransomware that takes your computers hostage has hit an all time low, from a morality point of view. While you have to admire their creativity, the […]
December 31, 2016
Explosives box

Hey Joe. Do you know where we keep the explosives?

Collaboration is an important element of business productivity. But it’s sometimes too easy to set up methods for sharing files between employees in different geographical locations, […]
December 1, 2016
Robot at keyboard

Employees need to learn to handle Cyber Threat Overload or they will be replaced

Remember back in that simpler time – 5 years ago – when botnets simply sent out spam or collected credit card numbers; or 10 years ago, […]
November 30, 2016
Leaking faucet

Nebraska Irrigation District teaches us all a lesson in thwarting ransomware

What’s the best way to combat a ransomware threat? The secret is to be proactive, and maybe extra paranoid. I’ll bet the guy who decided to […]
November 30, 2016

Like a slow-speed chase, the San Fran hacker story is mesmerizing

What makes a good hacker story? Is it when the hacker has a much bigger impact than everybody expects? Or is it when they get caught […]
November 1, 2016

Three reasons you may need to throw away your Smart Devices

While I have been pointing out the risks of using Smart Devices and adopting the Internet of Things (IoT) over the past year, there has definitely been a gathering recognition among the security industry - and now the news media - about these risks. Certainly, the high profile outage of Twitter, Spotify, Pinterest, Google and Netflix last week focused attention on the security vulnerabilities within IoT devices. Now people are starting to realize the potentially scary scenarios that are just wait to happen thanks to the poor security around these devices. It's great that more people now share my concern, and many are trying to identify solutions. But here are my reasons why many of the devices you've already purchased may always be vulnerable - and you may need to throw them away to stay safe.