Password Protection in the Enterprise – Secure Way to Communicate and Protect

They’re a basic foundation of security, yet somehow constantly dismissed.
Passwords are one of the most important components of a strong cybersecurity strategy—but employees overwhelmingly have bad password habits – despite all attemp… Continue reading Password Protection in the Enterprise – Secure Way to Communicate and Protect

Using Secure Communications to Safeguard Against Phishing

Over 90% of all cyberattacks begin with email phishing. It’s a startling statistic, but it’s not a surprise: businesses send over 281 billion emails every day. Phishing attacks, which typically ask targets for sensitive informatio… Continue reading Using Secure Communications to Safeguard Against Phishing

Lessons From Text Messaging Leaks – The Jeff Bezos Case

Shortly after Amazon CEO Jeff Bezos and his wife Mackenzie announced that they were divorcing, the National Enquirer published text messages that Bezos had reportedly sent to Lauren Sanchez, who he is currently in a relationship with. Bezos, like … Continue reading Lessons From Text Messaging Leaks – The Jeff Bezos Case

Controlling the Narrative: The Role of the Board of Directors

In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of directors do to protect sensitive corporate data? It is all too easy for inf… Continue reading Controlling the Narrative: The Role of the Board of Directors

Cybersecurity breaches in 2018: What We Learned

In 2018 technology touches nearly every aspect of our life. But no innovation seems to come without some form of drawback or compromise. While technology has undoubtedly improved most of our lives, it has also brought new risks that we all find a way t… Continue reading Cybersecurity breaches in 2018: What We Learned

Ahead of the Curve: University Incident Response Plans and Communications

Hurricanes, power-outages, man-made disasters—every organization has to prepare for these but when it comes to emergencies, universities face unique challenges because of the very nature of their structure and communities. Unlike the average offi… Continue reading Ahead of the Curve: University Incident Response Plans and Communications

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate. White House staffers have reportedly usedthe encrypti… Continue reading Government Messaging Solutions for the 21st Century: Think Beyond Encryption

Preventing Man-in-the-Middle Attacks

When it comes to cyber security, sometimes the jargon can feel overwhelming. Ransomware, encryption, man-in-the-middle attacks… The Vaporstream blog has covered ransomware and encryption in the past, so today I wanted to focus on what a… Continue reading Preventing Man-in-the-Middle Attacks

Secure and Compliant Grid Modernization

For more than a decade, the energy and utilities industry has been investing in smarter energy infrastructure in order to enhance energy grid resiliency, reliability and efficiency. Grid modernization has become essential to integrating an increasing n… Continue reading Secure and Compliant Grid Modernization

Attack of the Hackers: Cybersecurity and Local Governments in the 21st Century

You might have heard about the ransomware attack against Atlanta this year. A ransomware attack had significant impact on the city, forcing police officers to file reports by hand and city workers to report via time sheets. Atlanta is currently facing … Continue reading Attack of the Hackers: Cybersecurity and Local Governments in the 21st Century