
Using Big Data to Connect the Cybersecurity Dots
Big Data is generally defined as data that has a very high volume, lots of variety, is from a trusted source (veracity), changes rapidly (velocity)

Big Data is generally defined as data that has a very high volume, lots of variety, is from a trusted source (veracity), changes rapidly (velocity)

Windows, Mac OS, Android, Linux, laptops, tablets, phones and the list goes on. With all of the various computers, devices and operating systems in use

Quick Tip: Close your entire browser, not just the pop up. Why? You’re working at your computer when all of the sudden – BAM! –

Noted French anthropologist Claude Levi Strauss said, “The wise man doesn’t give the right answers, he poses the right questions.” Navigating the terrain in the

Quick Tip: Uninstall Apple’s QuickTime media player from all your Windows machines. Why? Maybe you have an iPad or iPhone that you sync or back

Quick Tip: Confirm it’s a legitimate WiFi network before you connect. Why: We’re all guilty of it: connecting to free public WiFi. Whether it’s at

Business identity theft is serious business! Steve Cox, from the Better Business Bureau, stresses that “Business identity theft is a very real concern in today’s

Quick Tip: Call for help immediately. Why: No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why

Tim “The Tool Man” Taylor, the accident-prone host of Tool Time in the1989 sitcom, Home Improvement, may have had lots of tools at his disposal,

Quick Tip: Set up withdrawal alerts on your bank accounts–both personal and work. Why: Many banks will send you an email alert whenever money is
"*" indicates required fields