The Legal System Response to Technological Advancements

As our advancement in technology continues to occur, we are finding more and more cyber-crimes to be prevalent around the world. How do we navigate through a world where businesses, accounts, email, etc… are constantly at risk of being infiltrated. I believe the first step to be the most crucial way forward in an ever-growing…

The CIA Triad

The CIA triad does not involve the government program regarding the Central Intelligence Agency. The Cyber definition for CIA is Confidentiality, Integrity, and Availability. These are the three main requirements for a secure system.Confidentiality refers to privacy. Measures to ensure confidentiality are designed to prevent sensitive information from getting into the wrong hands, while ensuring…

Opportunities for Workplace Deviance

Today most companies and organizations data are stored completely online. To safeguard critical data and information, companies will employ cyber security and IT officials to ensure the safe keeping of the organization’s digital assets. These assets can range from financial/legal information, trade secrets, customer data, to basic data that is crucial to the vitality of…

SCADA Systems

Supervisory Control and Data Acquisition (SCADA) is a system of software and hardware elements that allow industrial organizations to gather and monitor real time data. According to Eleks, “SCADA provides revolutionary data for organizations’ ‘. These systems can quickly alert an operator if a batch or product is not functioning properly, indicating a high number…

The Human Factor in Cybersecurity

Due to my limited budget, I would replace my human employees in the security field with cybersecurity automation. People cannot be entrusted with sensitive data and company securities. Data gets leaked and whether it is accidental or intentional by a disgruntled employee. Even with loads of money dumped into training employees, companies are still seeing…

Cybersecurity in the Biological Sciences Industry

In today’s age of technology, the potential of breaches and hackings on one’s company are through the roof. There is no shortage of information for hackers to obtain, but now we must worry about our DNA sent into to bio companies are at risk. Luckily there are mitigations and strategies that we can do to…

The NIST Framework

The NIST Cybersecurity framework is very beneficial to most if not all companies. The NIST framework offers direction for organizations that want to have better control and reduce cybersecurity risks. The NIST framework has a set of processes that can help measure and mitigate a company’s existing cybersecurity and risk management systems as well as…