CorelDRAW and OneDrive Failing to Install on Mac OS

  If you have tried to install OneDrive or CorelDRAW 2019 on a Mac and have received failure messages, read on.  TL;DR - The issue may be with the way your drive is formatted. Mac gives several options to format drives, including case sensitivity (for more information on what that means, see this). Reformatting the operating

iOS 11 Parental Control Settings

  I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks.  Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the

Reducing Classified Spillage Incidents

  A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information.  Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks. The

Why Multifactor Authentication is so Important

  As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure.  While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could

Protecting your Family Against Inappropriate Internet Content

  Anyone who has experience with the Internet knows how easily it is to stumble across inappropriate Internet content.  As a father of two, I am extremely cautious about my children's online activities and utilize parental controls on everything I can.  Whether you are a business owner trying to reduce what your employees can access

Creating Screenshots and Recordings in Digital Forensic Investigations Using Free Mac Tools

There are many reasons why anyone working in the digital forensics/incident response profession should have the ability to record the screen of their computer. Whether it is recording the actions taken during an investigation so another person can replicate them, recording an adversaries activity on a victim machine, or simply creating some training videos,
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.