A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...

Did the Russians get Anywhere close to Hacking our 2016 Election?

Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider   The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat   It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...