If you have tried to install OneDrive or CorelDRAW 2019 on a Mac and have received failure messages, read on.
TL;DR - The issue may be with the way your drive is formatted. Mac gives several options to format drives, including case sensitivity (for more information on what that means, see this). Reformatting the operating
If you have been following this blog series, you know that the first blog discussed the cyberattack kill chain and how hackers target individuals and systems and the second blog covered common cyberattacks and how they are perpetrated and identified. In this final post, I am going to discuss what users can do to harden their
In my first blog, I discussed the cyber kill chain and how hackers move through predictable steps to launch an attack against a target. In that blog, I used the example of an author who was targeted because of their controversial writings and the author’s system was compromised with ransomware. In this second post,
Cyberattacks and data breaches are unfortunately commonplace in the daily news cycle. Many of us have had our personal, healthcare, and financial data breached so much that we are used to receiving letters notifying us of unauthorized disclosures or getting signed up for yet another credit monitoring service. Cybercrime is out of control and
As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz”
If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How
As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure. While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could