Cybersecurity and Insider Threats
Now I have seen it all Charles Parker There are several companies offering cybersecurity in operation, with yet more popping up. This will probably not slow down with the need for cybersecurity persons increasing daily. Seemingly, the nation has noticed over-night with the pipeline attack that cybersecurity is actually important. These companies have various clients in their respective industries. One of these recently in the news for all the wrong reasons is located in Atlan
Cybersecurity and Business Passwords
By Carolyn Schrader Topic for small business staff meeting - Don’t reuse passwords Business owners can show they care about their employees’ cyber safety outside of office hours as well as at work. Consider sharing cyber safety examples during a staff meeting. October is National Cyber Security Awareness Month and a good time to continue cyber safety conversations with your employees. Topic for a staff meeting: Don’t reuse passwords Amazon frequently checks for reused user na
Cybersecurity and Tesla Hack
Tesla hacked...again By Charles Parker This is from the “What will they think of next” file. Imagine you have just purchased your dream car-the Tesla Model X. You drive it home, with the windows down and the music on. Life is good. You park in the driveway and start to walk up to your house with a smile on your face. Just before you unlock the door, you look back at your new purchase. There’s an annoying drone nearby. Your new pride and joy starts acting odd, especially sinc
Cybersecurity and Free Software
Free software with a side of malware by Charles Parker We all like free software. We find what we want on the internet and download it. Generally, there isn’t an issue. You can download Nmap, Kali Linux, and others with no issue. There is, however, always the anomaly or edge case when there is a problem. A recent issue occurred at a medical institute. In this instance, a student was working at a biomolecular institute in Europe. The institute happened to allow personal comput
Cybersecurity and International Health Services
Pwned: International Style by Charles Parker Hospitals provide a plethora of data. The attackers could target hospital and/or patient data. This is exceptionally marketable to many different entities. When the attackers couple this with ransomware, there are ample chances for severe attacks. This malicious tool has been used over the last few years in many different industries. The medical industry has been exceptionally hit by this. This is partially due to the criticality o