Internet of Things in life
Productivity

Controlling your Internet of Things (IoT) life

If you are beginning to wonder just how much IoT you have in your life and whether you should be concerned about it, the...

NPM package targets Russian and Belarusian systems
Cybersecurity

NPM package targets Russian and Belarusian systems in protest over Ukraine invasion

After the invasion of Ukraine by Russia, one developer of node packages changed the code in a package so that it would w...

US Cyber-Incident Law
Cybersecurity

Things Everyone Should Know About The Newly Signed US Cyber-Incident Law

Short on time? Listen instead. On March 15, 2022, US President Joe Biden signed into law the Consolidated Appropriati...

Windows 11
Microsoft Quick Tips

Windows 11 – Upgrade walkthrough

With the most recent version of Microsoft Windows– version 11, having become available in September of 2021, we wanted t...

Upgrading to Windows 11
Microsoft Quick Tips

Upgrading to Windows 11 – Making it a smooth transition for your data and hardware.

As our personal and work lives change and become ever more information-centric, so must our technology change to meet th...

HHS Warns of Sophisticated Malware
Cybersecurity

HHS Warns of Sophisticated Malware Dubbed “Tardigrade” Targeting the Biomanufacturing Sector.

Biomanufacturing, a term used to describe technology using biological systems to produce commercial biomaterials for med...

Risk Management Framework
Compliance and Regulatory

NIST [Cybersecurity] Risk Management Framework (RMF)

What are NIST and RMF?   The National Institute of Standards and Technology (NIST) was founded in 1901 to r...

Secure Communications
Cybersecurity

Protecting Your Organization’s Secure Communications

Many, if not all, organizations use the Internet and other networks to communicate both within and outside of the organi...

cybersecurity in the medical field
Cybersecurity

Network connectivity and cybersecurity in the medical field

How are medical professionals using technology to communicate? In the medical field, it is of the highest importance ...

HVAC’ and cybersecurity
Cybersecurity

The physical side of cybersecurity – heating, ventilation, and air conditioning for security.

As mentioned in our two previous posts on physical security in the cybersecurity realm, it is vital to consider the phys...

Social Engineering
Quick Tips

3 Ways to Protect Yourself from Social Engineering

Introduction Do you use a computer to get online and connect with friends on Instagram or post an update to Facebook ...

physical side of cybersecurity
Cybersecurity

The physical side of cybersecurity – contingency and continuity planning in the realm.

Introduction Physical security is not always considered as closely as it should be when planning an organization&#821...