https://youtu.be/7cBfks-faBw Facebook in trouble again. In this video I am discussing the importance of password security in light of the new revelation from Facebook.
https://youtu.be/brYacWZEneA This purpose of this talk is to discuss the origins of the primary internet monetization model and how it impacts data privacy and its relationship to Elizabeth Warren’s new proposal to break up the big platforms.
The genesis of this post is based on some research I have been conducting related to solutions for governing the internet. So, it is a bit different than what I normally write about, but very relevant given the resent proposal by Elizabeth Warren to break up the major social media platforms. The topic of most […]
There has been a growing chorus of those in the business community and even some cybersecurity professionals that think we should fight fire with fire. In other words, if we become the target of a hacker, the company should have the right to make the hacker a target. While understanding those feelings, I am not […]
For years, traditional wisdom has always been that large corporations are the primary target for hackers. This thinking stemmed from the understanding that motivations for hackers has evolved over the years to focus on monetary gain. In the early 2000’s, the motivation for hackers was to gain knowledge and discover what their true capabilities were. […]
[embed]https://www.youtube.com/watch?v=-Z3iQ4w-jDg[/embed] 12 Online Safety Tips for Cyber Monday and Every Other Day Only make purchases on reputable websites when shopping online. If you are unfamiliar with the website, the holiday season is not the time to experiment. Make sure your browser, OS, and third party applications are up to date. Make sure you are […]
Recently on LinkedIn there was an article from the bbc.com website where it was discovered government employee had been visiting pornographic websites on their government issues computers. As a result, their computers were infected with malware. This is not a new concept. People have been misusing their work computers for years. The internet is filled […]