Cybersecurity and International Phishing
Phishing: An International Issue  By Charles Parker The commonality of phishing is its efficiency in successful attacks from an ROI perspective. As this has worked so well in the US and other areas, the international application of this method of attack will continue to grow. This has also been an increasing issue for Canada.  Recently, to assist in decreasing the opportunities for successful attacks, a set of training ideas had been advanced. These included what is and is n
Cybersecurity and Vulnerabilities
Vulnerabilities in Many Forms By Charles Parker II Vulnerabilities are from many sources. One familiar source of these issues occurs with the output from scan reports listing items needing to be reviewed. Another source of constant issues for the Admins and CISOs are the users. This source is generally unintentional (clicking on links, files, etc. from emails). At times this detrimental activity may be intentional and directed. Within the last six months there has been two ca
Cybersecurity and Connected Cities
Connected Cities: More Areas and Vulnerabilities to Monitor By Charles Parker IoT has been notable in the news over the last two years. The focus has been the connected home/lights turning on/off or colors, thermostats, coffeemakers, refrigerators, and other equipment. One area somewhat ignored in the current research has been the cities. This would manifest itself into the cameras located on the streets monitoring movements and actions, microphones to triangulate where noise
Cybersecurity and Blanket Training
The Generic Blanket Training is not Appropriate or Effective By Charles Parker Every year corporations and businesses go through the annual, employee dreaded security training. Their eyes become glazed over and the staff’s mouths slowly begin to open even so slightly as the physical manifestations of the apathy being to appear.  To simply check the box that the training had been without usability focus is a fallacy of actual security. The training needs to be different from
Cybersecurity and Insider Threats
By Charles Parker II One area which has been explored, but not as extensively as it deserves, is the insider threats. This is not limited...
Cybersecurity and HIPAA Compliance
HIPAA: Compliance with Many Areas to Monitor By Charles Parker II The HIPAA regulation is a rather expansive regulation. With all of the...
Cybersecurity and Economic Models
Hacking Continues to Follow Economic Models By Charles Parker In economics, there are the basic supply and demand curves. As these move...
Cybersecurity and Info
Many Facets of InfoSec  By Charles Parker A well-balanced security program takes many aspects into the test and management log into...
Cybersecurity and Drones
Drones and Small Business Cybersecurity By Carolyn Schrader Drones are being used for many creative tasks. They are now used to deliver...
Cybersecurity and Government Brain Drain
Brain Drain in Our Government Agencies By Dr. Jane A. LeClair As long ago as 1981 the federal government was concerned with the loss...

