Source: National Cyber Security – Produced By Gregory Evans The results of an attack on the industrial internet of things could be as bad a Bhopal or Chernobyl, warn some the largest corporations in the world. A consortium of some of the largest multinational corporations in the world has The…
When Parents Feel Helpless: Using 5 Steps to Parental Intelligence
Do you feel helpless many times during the week when your child or teen presents a problem you aren’t ready for? Your child may be in a very irritable mood and you don’t know what’s cooking with friends, camp, or school. You’re bewildered and don’t know where to start to…
5 Steps to Ignite Your S.H.I.N.E.™!
If you work with students, are any of these comments familiar to you? I know I’ve heard my share over the years. “I can’t do this… it’s too hard.” “Sherry’s the smart one, not me, so ask her.” “I always fail so why try.” Unfortunately, this language is quite popular…
3 Steps to Take When Your Credit Card Goes Missing
Source: National Cyber Security – Produced By Gregory Evans Opening your wallet to pull out a certain credit card (matching rewards with purchases) can make you feel smart. But not being able to find that card — or worse, not being able to find your wallet — is an entirely different experience. During…
Congress steps up push for global cyber laws
Source: National Cyber Security – Produced By Gregory Evans Capitol Hill is increasingly concerned about the lack of international laws governing cyber war. In the last week, a bipartisan group of lawmakers sent the State Department a letter urging greater attention to the issue and one House leader introduced a…
Two Steps To Lock Out Cyber Thieves
Source: National Cyber Security – Produced By Gregory Evans SIOUX FALLS, SD -Just this week, the IRS says a data breach is much bigger than it originally disclosed, with hundreds of thousands of more people having their information stolen from an agency website. It can leave all of us feeling…
4 common but dangerous cyber threats and steps to address them
Source: National Cyber Security – Produced By Gregory Evans Increased access to the technical tools needed to launch cyber attacks, minimal risk of apprehension and lucrative payouts have created a perverse incentive for criminals to embrace crimes that are cyber-enabled or cyber-dependent. The nature of cyber crimes, the motivation behind…
Small steps to organize your time
In this day and age, time is everything. From the time we wake up, to the time we go to sleep, we are constantly moving. As a full-time college student and full-time employee, it can be difficult for me to juggle these responsibilities and find time for a personal life….
Small firms urged to take steps to combat cyber crime
Many small and medium-sized businesses ignore or underestimate the threat online fraud poses to their profitability, cashflow and reputation. Many small and medium-sized businesses ignore or underestimate the threat online fraud poses to their profitability, cashflow and reputation, according to […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
6 steps to protect against Russian hacker’s breach
Question: Should I be concerned about the news that Russian hackers have stolen a large number of passwords and if so, what should I be doing? Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com The post 6 steps to protect against Russian hacker’s breach appeared…