Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

How to Securely Erase Removable Media Using Windows 7

May 10, 2014 Author: Category: Greg's Blog

In a companion post, How to Securely Erase Removable Media Using Mac OS X, I explain how physical loss, theft or improper disposal of laptops or removable drives is the most common data breach of electronic personal health information. Personal identifying or health data disclosure are too frequent outcomes of…

read more

How to Securely Delete Data from Hard Drives

May 21, 2012 Author: Category: Greg's Blog

Don’t let that old hard drive leave the building without first scrubbing it clean of all data. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Organisations struggle to safely and securely delegate sys-admin tasks

May 18, 2012 Author: Category: Greg's Blog

If organisations had more confidence to delegate mundane tasks to junior staff and contractors they could free up more time for senior staff. [Read More…] View full post on IT-Director.com View full post on National Cyber Security

read more

Mobile Wallets—How I Make Mobile Payments Securely

May 13, 2012 Author: Category: Greg's Blog

Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. The plan is to eliminate all our credit cards, store cards, and IDs and use our mobile phones as our primary means of commerce and identification. The technology behind mobile…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved