Article on Cyber Security in Business Monthly

Thursday, October 11, 2012

Check out my article, “Practical Cybersecurity for Small Businesses: Crafting a Plan,” in the October 2012 Business Monthly magazine.

Posted by: Read full story »
Filed Under: Articles, News and Events, Security
Tags: , , , , ,

Cyber Security Lessons From China: What You Need to Be Concerned About

Saturday, October 15, 2011

Posted by: Read full story »
Filed Under: Articles, For Writers, Marketing, Security, Web Design and Development
Tags: , , , , , , ,

Cyberattack Lessons from China

Monday, January 18, 2010

I sent the following bulletin to my mailing list, but I thought I’d include it here as well: Dear Friends, Google and Microsoft have been in the news lately over the latest cyberattack from China. This one involves an exploit found in Internet Explorer versions all of them. (full report: Microsoft Security Advisory (979352) – […]

Posted by: Read full story »
Filed Under: Articles, Security
Tags: , , , , ,

Google Security Alert

Tuesday, September 9, 2008

Do NOT Use Chrome

Google Chrome LogoOn September 5, 2008, Google announced the launch of its own web browser. Chrome was billed as an open source browser with a “faster more reliable experience.” Seeing as how I might have to eventually program to this browser, I downloaded it for a test-drive to see how it rendered pages compared to Firefox and Internet Explorer.

Posted by: Read full story »
Filed Under: Articles, Product Reviews, Security, Web Design and Development
Tags: , , , , , , ,

Personablity vs Security: The Writers’ Quandary

Friday, August 22, 2008

I just saw something scary. I was researching some possible platform building forums for a client when I ran across one that made me cover my face with my hands and shake my head. There on the page, visible to everyone—whether they were members of the forum or not—was a woman who had posted details about herself, her family and her kids as part of this online community. Interspersed with the text were pictures of each of her five kids, labeled with their names and ages. This was signed with her full name, city and state of residence. I scraped my jaw up off of the floor and, on a whim, I went digging into her past posts. I found details about her kids’ personalities, food preferences, school—the list goes on and gets even scarier.

Posted by: Read full story »
Filed Under: Articles, For Writers, Marketing, Security
Tags: , , , , , , ,