If you look at most job requirements for a cybersecurity position the main ones listed are Security +, Certified Ethical Hacking, Certified Information Systems Auditor, etc. Coursera also offers many cybersecurity certificates that people have stated have helped their endeavors…. Continue Reading →
Things to consider when deciding what safeguards to use vary depending on the organization’s size or capabilities, the technical infrastructure, cost, and risk factors. Administrative, physical, and technical safeguards are recommended to protect ePHI. Administrative safeguards can include ensuring security… Continue Reading →
Cybersecurity framework is not required for all organizations or sectors. All federal organizations are required to use the framework, but only some state companies such as insurance ones are mandated to. The framework is just that, a frame or guide,… Continue Reading →
There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at… Continue Reading →
The most noticeable difference between IPv4 and IPv6 is that IPv4 uses a 32-bit address and IPv6 uses a 128-bit address. While there may not be a speed-related difference IPv6 has more qualities such as a built-in network security layer…. Continue Reading →
PKI or Public Key Infrastructure is one of the most common forms of encryption and manages public key encryptions. PKI is used in the government, but not in business sectors due to the requirements to manage the certificates. Without proper… Continue Reading →
The best value to a company can vary. I believe each product or system has its own set of benefits. One system is popular to buy and therefore lost income would hurt the company as the time to fix or… Continue Reading →
Establishing a baseline is essential for understanding how the normal flow of business will show on a report. You cannot know what is abnormal without first defining what normal is. Observing traffic for one day is not sufficient data, but… Continue Reading →
The best way to minimize a bad reaction to a lot of change is to teach about the benefits. Harvard Business Review lists 3 things people consider most when change is involved. Difficulty is vital as people would like to know how… Continue Reading →
One of the benefits of SSO is the less use of typing in the same username and passwords on multiple sites or applications. It can limit the number of issues related to password lockouts which reduces the workload of help… Continue Reading →
If law enforcement is not involved in the process of reporting cybercrime then why put our trust in companies? The debate starts as panic can spread when people find that a massive breach has occurred and information is at risk,… Continue Reading →
A threat can be defined as an interpretation or words that convey a vulnerability and a plan to act on it. An attack is an actual attempt to exploit that vulnerability. A threat can be defined as a risk of… Continue Reading →
I would say the biggest risk of IoT is the lack of secure communications and data storage. ITNS Consulting posted an article explaining the 5 biggest threats relating to IoT. One of the items listed is communications. In the article,… Continue Reading →
I believe the main difference between computer security and information security is a matter of what is being protected. Cybersecurity focuses on the technical aspect of data stored in a cloud, on a server, or over a network, etc. Cybersecurity… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑