Blog

  • Blockchain is more than Cryptocurrency: Enhancing Data Integrity

    Blockchain technology, best known for cryptocurrencies like Bitcoin and Ethereum, has significant potential beyond supporting digital currencies. It also offers ways to ensure data integrity—meaning that data is accurate, secure, and reliable—in various sectors such as supply chain management, healthcare, and finance. This post explores how blockchain can be applied to enhance data integrity, with… Read more

  • New Leadership at the Montgomery County Police Department

    By Walt Houser This week signifies a pivotal transition for the Montgomery County Police Department (MCPD) as Chief Marcus Jones departs after nearly four decades of dedicated service. Beginning July 1st, newly confirmed Chief Mark Yamada will assume department leadership. In his June 25, 2024, Media Briefing, County Executive Marc Elrich expressed profound gratitude for… Read more

  • Are Cybercriminals Exploiting GDPR?

    Unintended Consequences of Data Protection The General Data Protection Regulation (GDPR) was implemented to protect the personal data and privacy of individuals within the European Union. Its rigorous standards aim to ensure transparency and accountability in how organizations handle personal information. However, while GDPR has been largely celebrated for its positive impact on data protection,… Read more

  • Gotcha or Guidance: Redefining Phishing Training

    In the late 19th and early 20th centuries, a series of devastating fires spurred public outrage and demands for action from the nascent fire protection industry. Initially, experts focused on “Fire Evacuation Tests,” which aimed to evaluate individual performance by measuring how quickly occupants could evacuate, often through surprise drills mimicking real fires. These early… Read more

  • Avoiding Rejection: A Guide to Cyber Insurance Claims Approval

    In the realm of cybersecurity, insurance serves as a vital pillar in an organization’s risk management strategy. It acts as a safeguard against financial losses stemming from cyber threats like data breaches and malicious attacks. However, the path to securing claims isn’t always straightforward, with many facing rejection. This article provides insights into the common… Read more

  • False Faces, Real Dangers

    You’re at home watching TV late at night, and Facetime rings on your cellphone. On the the screen is the image of your crying grandchild. Tears streaming down her distressed face, she pleads for your help. She is in trouble in a foreign country and needs money for bail. However, she begs you not to… Read more

search previous next tag category expand menu location phone mail time cart zoom edit close