From Verbeek’s writing

With the rapid discovery of new technological devices and advances out there, it can be hard for us as consumers and human beings to keep up with. Markets, businesses, and groups are definitely having difficulty with this as something new is being discovered everyday. They need to be able to adapt to these changes in…

The “short arm” of predictive knowledge

From this week’s Jonas Reading, technology in itself is predictable and can be unreliable at times. To clarify, at any time our computers can shut down and we can lose files, data, etc. if they are not backed on a hard drive or cloud. Also, with the use of technology, there can be many pros…

The CIA Triad

The purpose and primary goal of the CIA Triad is to protect the data of different organizations. It is a “information security model” that is used by many organizations to keep their information secure. When it comes to the creation of the CIA Triad, there is no record of just one creator of the model….

SCADA Systems

Critical infrastructure systems are important and necessary aspects which keep our economy functioning efficiently. Some of these are our water supply, gas pipelines, highways, railroads, etc. However, these critical infrastructure systems can become vulnerable to attacks, specifically cyber-related. One example of a threat to critical infrastructure is the Colonial Pipeline attack. It happened back in…

NIST Cybersecurity Framework

Having some form of security in the workplace is vital, especially with the aging of technology. The effects of not having any form of cybersecurity can be detrimental to a company. For instance, “it can harm an organization’s ability to innovate and to gain and maintain customers” (NIST Improving Cybersecurity). However, organizations can gain many…

The Human Factor in Cybersecurity

Realizing that I have a limited budget, I would balance the tradeoff of training and additional technology by securing all data to only allow authorized people to access the data. As a result, this would protect “enterprises from both internal and external threats without altering the way users collaborate, share, and use files” (Capone, 2018)….