Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Email Vulnerability

Email vulnerability to hackers has many cyber security experts concerned.  With the White house emails being hacked, along with the former Secretary of State’s in private servers, encrypted email system are too vulnerable to attack by sophisticated hackers who may be working for foreign powers. Obama carries a specially secured BlackBerry device for top-secret communications. It appears…