Certifying Digital Court Records - Digital Planning Podcast
As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more
Starting my new role as Director of Marketing at Accelerynt has been filled with the usual excitement of a new chapter. But it also delivered a moment of unexpected personal relief—and professional inspiration. Coming from an...more
Saying the word "crypto" will get a visceral reaction in many circles, and if you say you still believe in the future of crypto, you have a high likelihood of being blacklisted. I get it. It has been a tumultuous 16...more
Massachusetts AG Maura Healey released a statement urging Massachusetts businesses and government entities, including law enforcement, to immediately assess existing data security practices and take appropriate steps to...more
We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more
Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more
I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more
Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more
Sometimes I feel like I’m the Grinch at a party when I talk shop about the latest massive data breach or horrible hacker story that is in the news. We say things like, “it’s not if, but when” there will be another data...more
Many consumers, and many employees, have dozens of passwords for access to different systems, services, networks, device, and terminals. From a corporate perspective, many companies have at least two policies that impact...more
According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more
If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more
“Defense in depth” refers to employing multiple layers of security that makes it more difficult for cyber hackers to gain access to sensitive plant control networks. These can include complex passwords, shorter password...more
On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more
I love to train employees on data privacy and security. It tends to be rather entertaining as I can tell crazy stories about real life scenarios about data breaches or compromises. The stores are quite beneficial, as most...more
On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more