Access and Feeds

Blog Archives

Cyber Hygiene: Seven Steps to Avoid Malware and Hackers

By Dick Weisinger

Cyberhygiene is the protection of access points for devices connected to a network. Appropriate security measures will monitor and protect computers, laptops, networks, printers, and operating systems from malware and other attacks that might attempt to breach security. Ali Dehghantanha,

Data Protection: Embedding Data with Intelligence to make it Self-Secure

By Dick Weisinger

Data protection isn’t easy. The endless list of breaches that occur and expose many thousands and millions of data records is a reminder of just that. Elliot Lewis, CEO at Keyavi Data, said that “cybersecurity technologies have been overly focused

Cybersecurity: Users Stressed by Constant News of Data Hacks and Breaches

By Dick Weisinger

People are getting stressed out by worries of hacking and cyber threats. A Kaspersky Lab report found that 81 percent of Americans feel stressed every time they see news about data breaches. Heidi Hanna, executive director of the American Institute of

Blockchain and Cybersecurity: The ‘Cyber’ of Cybersecurities doesn’t Equate to Cybersecure

By Dick Weisinger

While Blockchain technology forms the basis for how cybercurrencies work, the ‘cyber’ of cybersecurities does not mean that blockchain can be effectively used to solve other kinds of ‘cyber’ problems, like cybersecurity. Marta Piekarska, , said that┬áblockchain is no magic

CyberSecurity: Businesses Powering the Criminal Economy Mirror LegitimateTechnology Businesses

By Dick Weisinger

A $1.5 trillion economy is controlled by cybercrime, according to a report by Bromium, Into the Web of Profit. The breakdown of illicit money derived from cybercrime activities is as follows: $860 billion – online illegal drugs and counterfeit goods