Cybersecurity and Surveys
Everyone’s a target-even survey collecting companies by Charles Parker Occasionally people receive in their email a link to complete a...
Cybersecurity and Embedded Systems
Securing embedded systems by Charles Parker Embedded systems are all around us and everything you do. If you drive a car, have a...
Cybersecurity and PII/PHI
They call it PII/PHI for a reason by Charles Parker When a company collects your data, there are a few ground rules to follow. The...
Cybersecurity, Passwords and Small Businesses
Business owners can show they care about their employees’ cyber safety outside of office hours as well as at work. Consider sharing cyber...
Cybersecurity and Blanket Training
Every year corporations and businesses go through the annual, employee dreaded security training. Their eyes become glazed over and the...
Cybersecurity and Changing Cultures
Cybersecurity is a word that is getting a lot of attention these days. Hardly a week passes without the public being informed by the...
Women In Cybersecurity
The facts speak for themselves...there are literally hundreds of thousands of unfilled cybersecurity positions, there is expected to be a...
Cybersecurity and the Value of Verification
Value of verification By Charles Parker, II In early February of this year, there was a published story of millions of smart toothbrushes...
Cybersecurity and ICS Ransomware
By Charles Parker, II Ransomware can be directed at any company. The bigger, the better for the number of targets, accessibility, and...
Cybersecurity and World-Wide Ransomware
Ransomware: Not just a US issue by Charles Parker, II Ransomware is rampant through most industries for several reasons. One target...