I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10 (available here), so I decided to follow on with another post on how to setup parental controls with Windows 10. While Microsoft has had some good parental control features with Windows 7, when Windows
I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks. Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the
If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How
Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them. BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives.
A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information. Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks.
As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure. While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could
The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level. The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering. For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this