Cybersecurity and the Medical Field
The medical field has been targeted over the last few years for attacks. The focus has and continues to be the data being held. These attacks may take any of the many different forms of attack, dependent on the target’s equipment, configurations, and other factors. The data targeted by the attackers has value to them and for resale. A recent case directly involved this. UCSF experienced a successful attack on June 1, 2020 with their School of Medicine’s IT environment. While
Cybersecurity and Shipping
Shipping goods and services can be a rather taxing process in its own right. If the product is smaller, and the contents are not on the warning list (e.g. dry ice, and lithium batteries), shipping is not a horrible task. With larger objects, this may be more of an interesting chore and task to including the crating, insurance needs, and other forms to complete. Adding a layer of complexity for this would involve international shipping or importing and exporting these. There a
Cybersecurity and Toys
Toys bring a smile to a child’s face. At certain events and holidays, children and some adults look forward to for an entire year. As much joy and happiness as these bring to most people, these are manufactured by big business. These, while having a definite role in society, also are a target. The business and its locations for warehousing and manufacturing hold data, and computer systems that could be exploited. Recently, the toymaker was hit with ransomware and joined the c
Cybersecurity and Blockchain
Blockchain over the many years since its inception has been used primarily for one use-cryptocurrency. With its immutability due to the blocks and each being recorded after 51% of the block members’ approval. As time has passed, more industries have started to research this for their own use case. As the protocol is not application-specific, there are many industries this is perfectly in tune with. With the wide variety of uses, it’s no wonder this has been researched in the