Cybersecurity and Healthcare
Hacking Continues to Follow Economic Models By Charles Parker II In economics, there are the basic supply and demand curves. As these move up or down, and left or right, dependent on the circumstances, the price point changes. For instance, as the supply increases, the price decreases. This has been occurring with the price of healthcare or medical records. When the healthcare industry began to be targeted more than others, the attackers saw this as an opportunity to genera
Cybersecurity and Your Vehicle
Think Twice Prior to Connecting Your Smartphone to Your Vehicle By Charles Parker II Most people are affected by connected vehicles in some form or another. This may take the form of the user driving their car to the grocery store or to work, the cabs driving people home, the rental vehicle from the airport, a driver using the map function in the infotainment center, and buses being driven through the suburbs and city. Most of these vehicles being seen every day are connected
Cybersecurity and Focused Training
Select small business audiences need focused cybersecurity training By Carolyn Schrader Now that everyone in your company has participated in basic cybersecurity awareness training and your IT people have done several phishing email exercises, it might be time for you to consider focused training for select employee audiences. Hackers continue to get more sophisticated, so your training needs to continue to expand. Nigerian payment scams still exist, but new innovative scam
Cybersecurity and When, not if...
When, not if... By Charles Parker The number of businesses through the nation is rather large. Many of these know they are regularly targeted. Too many of the remainder businesses are hoping that security by obscurity works. It does not. Small- and medium-businesses (SMB) are actively targeted by the attackers due to this lack of sufficient focus on Infosec. One symptom of this is a lack of a security policy, or one in place on the shelf with a large amount of dust due to a l
Cybersecurity and Blanket Training
The Generic Blanket Training is not Appropriate or Effective By Charles Parker II Every year corporations and businesses go through the annual, employee dreaded security training. Their eyes become glazed over and the staff’s mouths slowly begin to open even so slightly as the physical manifestations of the apathy being to appear. To simply check the box that the training had been without usability focus is a fallacy of actual security. The training needs to be different fr
Cybersecurity and Cell Towers
Cell Phone Towers Are Also Vulnerable By Charles Parker The typical cell phone towers are omnipresent through the countryside and in the cities. In the cities they may be located on parking structures, buildings, in vacant lots, or near buildings. These cell phone towers or base transceiver stations (BST) function to facilitate the communications between the user’s equipment and the network. This communication is the transmitting and receiving of signals. Issue This equipme

