Introduction to Cybersecurity

This presentation discusses no/low cost approaches to improving cybersecurity and some of the unique challenges faced in securing SCADA systems. Two videos also present evidence that humans are the weakest link in the security chain.

Top 5 No-Cost Cyber Security Practices

I’ve come to a remarkable, if not depressing realization in my information technology career.  Over the last 20 years of consulting, I’ve visited scores of clients in hundreds of facilities and I can easily count the number of times I was ever given any sort of cyber security orientation – exactly once.  I’ve walked into … Read more

How to Spot Phishing

Phishing is a deceptive tactic used in emails, on bogus web sites, and other communication media that convince people to click on a link that typically brings the user to an impostor web site. These cyber attacks are generally attempting to accomplish one or both of the following: Surreptitiously obtain personal account information Plant virus … Read more