Ransom Attacks

  There are three broad categories of hackers: Destructive (crash a website, destroy data) Social Justice (Edward Snowden, WikiLeaks) Those that want to make a Profit  One of the popular tactics used by those in category 3  is to hack into a company database (such as Target) and steal credit card information. The hacker can then take these […]

Read More…

SECURITY – sometimes difficult to define

I received a letter from the U.S. Office of Personnel Management in Washington, D.C. recently. The OPM experienced a major security HACK, which they publicly admitted (thank you).  This breach of data  included, as I learned in the letter, details that were voluntarily provided and additional information from background investigations for thousands of security clearances, including mine (past life). […]

Read More…

From the Users Perspective

As consumers, we regularly embrace new technologies. There is no extended training process, (well- maybe, if you are old enough to remember the flashing 12:00 on a VCR) and certainly no requirement that you understand all of the complex technology behind it. In the 911 community, however, there is a push to educate everyone on […]

Read More…