Who's Behind All the Phishing?
The Verizon 2016 Data Breach Investigations Report (follow the link to a page from which you can download it) is out. This year, it is based on a dataset of 64,199 incidents that resulted in 2,260...
View ArticleThe Six Top Sources of Human Cybersecurity Error
Last year, there were more than 25 major data breaches, including OPM, the IRS, Ashley Madison, Anthem, CVS, Walmart, and Scottrade. Business news was dominated by these events. But it occurs to me...
View ArticleA New Way to Look at Hacking
A new white paper from Hewlett Packard Enterprise advances a novel perspective on cybercrime. The Business of Hacking (you can download the report for free) examines cybersecurity from the standpoint...
View ArticleITIL® and the Renewal of National Productivity
A friend of mine once interviewed for a job as administrative assistant to the CEO of a photoelectric sensor manufacturing firm. In a series of interviews, she met with the incumbent in the job, who...
View ArticleFamous Last Words of Cybersecurity Management
We have reached the point that businesses are paying attention to cybersecurity, which is a good thing. All over the country, organizations are promulgating policies, conducting training programs,...
View ArticleHow Cybersecurity Is a Sales Job
A recent blog posting at the InfoSecurity website suggests that instead of moaning about how employees are the weakest link in your security chain, you take steps to make them the strongest....
View ArticleHow to Use the Cost of a Data Breach to Justify an Incident Response Team
The 2016 Cost of Data Breach Study: Global Analysis has been released, and you can download it here (registration required). Sponsored by IBM and performed by the Ponemon Institute, this year’s study...
View Article4 Big Challenges in Moving Your Business to the Cloud, 1 Major Step to...
I see four big business challenges in moving to the cloud:1. Selecting a Vendor. There are lots of cloud providers, and each offers its own unique blend of services, stability, and commitment. Whatever...
View ArticleWhy It's Never Too Late for Vendor-Neutral Cloud Training
On this blog lately, I have been trying to make the case for vendor-neutral cloud training. Vendor-neutral cloud training, of course, can help your organization embrace the best practices in cloud...
View ArticleThe Ashley Madison Hack — One Year Later
Cybersecurity is more than a technical operation. It is a human undertaking, and its failures lead to human cost. Few events illustrate this better than the Ashley Madison hack, which I blogged about...
View ArticleLogical Operations and Digital Marketing Institute
In the 1989 film, Field of Dreams, an Iowa corn farmer named Ray Kinsella hears a voice telling him to build a baseball diamond in his field. Ray builds the field, and the spirit of legendary ball...
View ArticleTime and Cybersecurity Training
The threat to your organization of a data breach is real, as are the limitations of pure technology in protecting you. Of the top six sources of cybersecurity error, four of them… general...
View ArticleA New and Potent Cyber-Scam
A couple months back, I discussed with you the BEC, or “business email compromise,” scam. According to an FBI alert, “The schemers go to great lengths to spoof company e-mail or use social engineering...
View ArticleCloud Computing Skills
The message that IT pros need to understand cloud computing as a discipline rather than as a proprietary platform seems to be catching on. A recent article in InformationWeek titled “9 Cloud Skills IT...
View ArticleCloud Computing: Skills Before Bandwagon
Conventional wisdom suggests that cloud computing offers several technical advantages over traditional IT systems:scalabilitysimplified managementreduced maintenanceincreased reliabilityBut let’s face...
View ArticleInstinct vs. Business Intelligence
Instinct is the propensity of a creature to engage in a defined behavior when presented with a certain stimulus. Sea turtles, for example, are born on the beach, but once hatched, they make their way...
View ArticleCoping with the Surge of Ransomware
According to a report published this summer by Kaspersky Labs, the use of ransomware cryptors is enjoying explosive growth. A ransomware cryptor is a piece of malware that infects your computer and...
View ArticleNew Options for Your Career in VMware
Today’s PC server hardware was designed to run a single operating system, and it doesn’t matter how many processors or cores you have. This means most machines have a great deal of capacity going...
View ArticleNotes in the Margin: It’s Possible with CHOICE
In 2011, Wiredran an article titled “5 Reasons Why e-Books Aren’t There Yet.” It was a good article and fairly amusing: one of the reasons was that you can’t use eBooks to decorate your home(!). The...
View ArticleIs It Time to Move Beyond Passwords?
Last year in Quora (a question-and-answer site where questions are asked, answered, edited, and organized by its community of users), a member asked the question“How do hackers hack your passwords?”...
View Article
More Pages to Explore .....