Who to trust in cyber security…

You know the more I investigate cyber security for my procedure manual the more I am thinking, most for those attempting to prove themselves experts, don’t know what they are doing. A vast number of them seem to just spew buzz words that don’t say anything.  I include...

The Five Cs of Security as a Service

As I was looking for an outline for our Cyber Security Manual, l I stumbled upon this whitepaper.  I found it interesting enough to summarize here. Change – Organizations face a constantly changing array of pressures from multiple external sources. Compliance...

Hanna and Barbera lied to me…

100 years ago, when I was growing up and network television was alive and well with all three channels and one PBS channel and 3 local channels.  I watched cartoons (I still do, a lot of the same ones from my youth via DVD). One of my favorites was Yogi Bear. It...

Data Breaches

Did you know that 95% of breaches are due to human error?  I admit I was not surprised by this number.  What did surprise me was that 91% through e-mail, this was a bit of a shock. MyDoom did $38.4 billion in damage, there are also 4 million records are stolen from...

AI in use today

How many of you are using AI regularly?  Do you Alexia? Play chess online? How about Amazon shopping recommendations?  All utilize AI, so you have been using AI without even knowing it. Chat GPT newest iteration of AI. ChatGPT is a large language model-based chatbot...

Pin It on Pinterest