Today’s World Backup Day has its roots in a campaign started by hard drive company Maxtor (later acquired by Seagate) in 2005. Back then, it was called World Backup Month. Ismail Jadun, a technology consultant, has been credited with initiating … Continue Reading

Gaming Industry Faces Growing Cyber Threats
The recent cyberattack on game designer CD Projekt Red has highlighted a common but largely overlooked cyber threat. We’ve seen headline after headline about malicious actors using the global COVID-19 pandemic to target overburdened healthcare providers. They’ve even tried to … Continue Reading

CES 2021 Gadgets Target COVID-19 Challenges
CES 2021 wrapped up its virtual trade show this week. The ongoing COVID-19 pandemic meant that attendees had to settle for virtual booths, video demos, and live-streamed press conferences instead of in-person events in Las Vegas, Nevada, where the conference … Continue Reading

Protect Your Crypto Keys, Protect Your Data
Encryption has become a hot topic not only in the tech world but in the world of government as well. Adding backdoors to encrypted products is a movement of which many leaders are in favor. People are searching for more … Continue Reading

Australian Telecommunications Act Causes Privacy Concerns
Australia has been a hot topic in the tech world due to its bills and legislation that give law enforcement and other government officials backdoor access to technology and the power to intercept communications to check for threats or criminal … Continue Reading

How Researchers Can Protect COVID-19 Research Data
The COVID-19 pandemic has not only changed the way we live but has changed the way that medical researchers are operating. Many organizations have dedicated their time and resources to finding a vaccine for the Coronavirus and need data such … Continue Reading

Healthcare Sector More at Risk for Cyberattacks During COVID-19
Healthcare facilities have been a target for cyberattacks and data breaches even before the pandemic. A health record that includes Protected Health Information (PHI), is more valuable than any other type of stolen data with a selling cost of up … Continue Reading

Implementing Encrypted USB Policies During WFH and Beyond
Since flash drives hit the market in the late 1990s, they have grown to become one of the most popular devices for storing data. Companies give them away at trade shows with their company logo and schools give prospective students … Continue Reading

CIA Participates in Nationwide Encryption Scheme
Government entities worldwide have used encryption to enable confidential communication about covert operations, allied countries, and strategic plans during wartime. Beginning in the 1940s during World War II and continuing throughout the Cold War, a machine known as the M-209 … Continue Reading

How Healthcare Organizations Protect PHI from Hackers
To a healthcare organization, its most valuable assets are the technology used to treat disease and highly trained medical professionals who care for patients. To a hacker, the most valuable asset is protected health information (PHI). This dataset contains information … Continue Reading