Failing to Backup Is a Fool’s Bargain

Today’s World Backup Day has its roots in a campaign started by hard drive company Maxtor (later acquired by Seagate) in 2005. Back then, it was called World Backup Month. Ismail Jadun, a technology consultant, has been credited with initiating … Continue Reading

Gaming Industry Faces Growing Cyber Threats

The recent cyberattack on game designer CD Projekt Red has highlighted a common but largely overlooked cyber threat. We’ve seen headline after headline about malicious actors using the global COVID-19 pandemic to target overburdened healthcare providers. They’ve even tried to … Continue Reading

CES 2021 Gadgets Target COVID-19 Challenges

CES 2021 wrapped up its virtual trade show this week. The ongoing COVID-19 pandemic meant that attendees had to settle for virtual booths, video demos, and live-streamed press conferences instead of in-person events in Las Vegas, Nevada, where the conference … Continue Reading

Encryption Key Storage

Protect Your Crypto Keys, Protect Your Data

Encryption has become a hot topic not only in the tech world but in the world of government as well. Adding backdoors to encrypted products is a movement of which many leaders are in favor. People are searching for more … Continue Reading

Encryption and Telecommunication in Australia

Australian Telecommunications Act Causes Privacy Concerns

Australia has been a hot topic in the tech world due to its bills and legislation that give law enforcement and other government officials backdoor access to technology and the power to intercept communications to check for threats or criminal … Continue Reading

Data Protection COVID-19 Reseacrh

How Researchers Can Protect COVID-19 Research Data

The COVID-19 pandemic has not only changed the way we live but has changed the way that medical researchers are operating. Many organizations have dedicated their time and resources to finding a vaccine for the Coronavirus and need data such … Continue Reading

Healthcare Cyberattack Increase COVID-19

Healthcare Sector More at Risk for Cyberattacks During COVID-19

Healthcare facilities have been a target for cyberattacks and data breaches even before the pandemic. A health record that includes Protected Health Information (PHI), is more valuable than any other type of stolen data with a selling cost of up … Continue Reading

Secure USB Policy Remote Work COVID-19

Implementing Encrypted USB Policies During WFH and Beyond

Since flash drives hit the market in the late 1990s, they have grown to become one of the most popular devices for storing data. Companies give them away at trade shows with their company logo and schools give prospective students … Continue Reading

CIA and German Encryption Scheme

CIA Participates in Nationwide Encryption Scheme

Government entities worldwide have used encryption to enable confidential communication about covert operations, allied countries, and strategic plans during wartime. Beginning in the 1940s during World War II and continuing throughout the Cold War, a machine known as the M-209 … Continue Reading

Best Practices to Protect PHI from Hackers

How Healthcare Organizations Protect PHI from Hackers

To a healthcare organization, its most valuable assets are the technology used to treat disease and highly trained medical professionals who care for patients. To a hacker, the most valuable asset is protected health information (PHI). This dataset contains information … Continue Reading