Author: Dr. Hollis

  • January 27, 2023
    Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems are examples of operational technology (OT) systems that…
  • January 26, 2023
    Free USB charging stations have become commonplace in many public places, from airports to hospital waiting rooms. While this appears…
  • January 25, 2023
    Remote workers are more vulnerable to attacks if proper precautions are not taken because they are not protected by firewalls…
  • January 24, 2023
    The five domains in the NIST framework are the pillars that support the development of a comprehensive and successful cybersecurity…
  • January 20, 2023
    Cryptocurrency is a type of digital currency that is decentralized. Because the currency is decentralized, it necessitates the use of…
  • January 19, 2023
    Technological advancement appears to be outpacing the passage of time. Advances are coming at us faster than we can keep…
  • January 18, 2023
    The role of cybersecurity in business, technology, and society has become mission-critical.critical. Simply put, cybersecurity is the foundation of the…
  • January 17, 2023
    Cybersecurity for connected automation vehicles is related to the protection of its electronic systems, communication networks, algorithms, software, hardware, and…
  • January 13, 2023
    Scammers typically send a QR code and ask people to scan it in order to receive money from them. When…
  • January 12, 2023
    The ‘Free’ InspectionWhen it comes to someone showing up on your doorstep and offering a free inspection, the adage "there's…
  • January 11, 2023
    There are some basic network security steps you should take to cover the fundamentals of network security and ensure you…
  • January 10, 2023
    Scammers use scare tactics to trick you into paying for unnecessary technical support services that ostensibly fix device or software…