November 22, 2017
Cyber insurance is improving

Maybe we can just “insure everything” and call it a day…

An associate, hopefully in jest, recently commented to me: “Remind me sometime to show you the scars from every time I’ve slit my wrists after reading […]
November 3, 2017
Game-screen

Help me decide who I should dress up as AFTER Halloween

[Title image courtesy of New Mexico State University’s Learning Game Lab – https://learninggames.nmsu.edu/ ] Just when you thought Halloween was over, and you could free your mind […]
February 28, 2017
Many inputs to computers

Don’t be asleep at the wheel, Big Data privacy issues are critical for businesses and individuals to grasp

By now, you’ve probably heard the term “Big Data”, and may even be getting sick of hearing about it. Whether you’re new to it or not, […]
February 14, 2017
Goldfish with hooks around

Why do so many people click on phishing email messages?

Your UPS delivery was missed… The IRS says you owe them thousands of dollars… You’ve reached your computer disk storage limit… Your Apple account information has […]
January 16, 2017
Safe with USB cables

Working with extremely sensitive data

A friend of mine is developing some complex software that he hopes to license to other companies. When I asked him how he was protecting it […]
January 1, 2017
Collage of computers and users

Attacks on prominent businesses show how industrial and economic spies are targeting and finding valuable intellectual property

While most of the cyber crime news stories focus on financial and personal information theft, there is clear evidence emerging that large-scale espionage is being conducted […]
January 1, 2017
Let's make a deal doors

When Popcorn Time ransomware offers you Door #2, don’t choose it

Ransomware that takes your computers hostage has hit an all time low, from a morality point of view. While you have to admire their creativity, the […]
December 31, 2016
Explosives box

Hey Joe. Do you know where we keep the explosives?

Collaboration is an important element of business productivity. But it’s sometimes too easy to set up methods for sharing files between employees in different geographical locations, […]
December 1, 2016
Robot at keyboard

Employees need to learn to handle Cyber Threat Overload or they will be replaced

Remember back in that simpler time – 5 years ago – when botnets simply sent out spam or collected credit card numbers; or 10 years ago, […]
November 30, 2016
Leaking faucet

Nebraska Irrigation District teaches us all a lesson in thwarting ransomware

What’s the best way to combat a ransomware threat? The secret is to be proactive, and maybe extra paranoid. I’ll bet the guy who decided to […]