Our Thoughts On Archive

Sort by

Categories
Authors

Cybersecurity

Articles 251 - 260 of 273

Losing your phone is no longer just an inconvenience.

For many of us, a cell phone has become an indispensable tool in our daily life. We use it to communicate with others, to take pictures, and to keep track

Cybersecurity Considerations for Employee Benefit Plans

The DOL's ERISA Advisory Council recently issued a report, Cybersecurity Considerations for Benefit Plans, which summarizes its examination of and
Geek warning: some tech knowledge required for this article – or at least willingness to look stuff up. This article was repurposed from Matt Dunn’s

Yahoo Data Breach - What Happened, What To Do Next and How To Protect Yourself

Yahoo reported last Thursday at least 500 million user accounts were affected by a massive data breach. The hack happened in 2014, when hackers stole account
Register to receive our weekly newsletter with our most recent columns and insights.

October is Cyber Security Awareness Month

Free Daily Cyber Security Tips to Recognize Cyber Security Awareness Month (October) Every working day, businesses and organizations are threatened by
Do you aggregate? In layman’s terms, do you download or link your financial information to one place? You may use mint.com, or Intuit’s Quicken,

Air Gapped SCADA & ICS Networks Now Threatened From Ransomware

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of SCADA & ICS systems. This new

IT Security Tip Sheet: Using a Wireless Keyboard? What You Should Know

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of wireless keyboards. Many businesses
Register to receive our weekly newsletter with our most recent columns and insights.

IT Security Tip Sheet: From Pokémon to the Microsoft Print Spooler Bug

Cybersecurity and IT issues have been hot topics in the news lately, and it’s never been more important to stay informed. In my role as IT Audit

CISO On-Demand: A New Option

Chief Information Security Officer (CISO), or the equivalent function, has become a standard in business, government and the non-profit sector throughout
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh