Connected

Connected

Follow  Securing Critical Infrastructure   Securing our Critical Infrastructure is an ongoing process that is a priority for both the public and private sector. The threats continue to evolve and gain in sophistication and impact on society in general. Threat vectors will continue to evolve within cybersecurity, as will the targets....
Read More »

Connected

By
April 1, 2016

Follow Electronically Fit or Tracked Recently, I saw a social media post, which mentioned exactly how many steps someone had taken while on a vacation. When asked by someone else, how the individual knew how far they had walked, the person commented that their companions’ smart phone had kept track of...
Read More »

Connected

By
March 1, 2016

Follow Thirteen There are presently thirteen iPhones that federal law enforcement would like Apple to unlock. On February 29th, 2016, a New York judge sided with Apple, and has denied the Department of Justice (DOJ) request to override the security measures of the iPhone, in a case involving Jun Feng, a...
Read More »

Connected

By
February 1, 2016

Follow Is Energy a Profitable Market?   One of the many questions plaguing the Energy and Utilities Industry is the development of bi-directional energy; the notion that if you and I, as consumers, have, for example, solar panels in our home, which produce more energy than we use, under what conditions...
Read More »

Connected

By
January 1, 2016

Follow   Cybersecurity Checkup© A Year in Review As 2016 begins, we will face many wanted and unfortunately unwanted changes; however, something which will not be changing in any of our lives is our interaction and dependency on technology. Whether we want to be Connected or not, we are; it is...
Read More »

Connected

By
November 1, 2015

Follow   Cybersecurity Checkup© for November Toxic Social Media There have been many security breaches’ this year, most recently Experian; and every time we hear of a new breech, people go on the news and talk about how companies are not protecting our data. The big bad company that does not...
Read More »

Connected

By
October 14, 2015

Follow   Cybersecurity Checkup© for October   Password Alert This month I want you to take a few minutes to think about your passwords, and why it may be time to not only change them, but to change the way you create them. I have always been adamant about changing our...
Read More »

Connected

By
September 1, 2015

Follow   Cybersecurity Checkup© for September   The Talk As children get ready, to return to school, this is a good time to have the talk. The talk concerns the fact that if your children are old enough, trusted enough, and responsible enough to be connected, then they are also smart...
Read More »

Connected

By
August 12, 2015

Follow   Cybersecurity Checkup© for August Cyber Threats to Mobile Devices How do you protect your Mobile phone?   Do you even think about protecting your mobile phone?  Something that is said about computer security people, is you put a smart phone in our hands, and we become dumb. The mobile phone...
Read More »

Connected

By
July 7, 2015

Follow   Cybersecurity Checkup© for July Targeted Advertising Are you a victim of targeted advertising? When you search for an item, does the item start to follow you on subsequent web pages.  It can be frustrating as you start to feel your anonymity disappear. Target advertising has helped websites become and...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.