Minor Detail – Backup is not Done until Proven Recovery
In my upcoming book many things will be discussed including why it is necessary to test your backups and recover the data. Why is this a big deal? Because if…
Defend Your Systems
In my upcoming book many things will be discussed including why it is necessary to test your backups and recover the data. Why is this a big deal? Because if…
Threatpost has the story in Utah legislation work. Let’s explain some catfishing: “The practice of catfishing often occurs in online dating or social-networking scenarios in which someone takes someone else’s…
NIST is the National Institute of Science and Technology and CSF is the Cybersecurity Framework. There are manypdf’s (v1.1) on this topic, but the changes in versions are not my…
Let’s list some of the problem areas: Ransomware Phishing Backups – Restore Remote Access Cloud Computing Awareness Issues – Training If you do not prepare for the future then it…
The human factor is always underappreciated in helping decide on what can be done with our Computer Security. “Security Mental Model: Cognitive map approach” Tahani Albalawi, Kambiz Ghanzinour and Austin…