Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen   If it is connected it can be hacked.  The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...
Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable   IoT or Internet of Things devices are becoming more and more popular.  It seems that all types of items we never considered to require connectivity are now connected to the internet.  They are constantly passing...
Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations   It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why?  Medical data is worth big bucks — up to...
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption   Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories.  They simply take all our information and re-sell it making huge...
Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores.  Additionally, businesses depend on older software applications are at a great risk...