July 16, 2018

Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The centerpiece of these breaches, after months of forensic analysis, has been a lack of following IT industry accepted security best pract...

February 7, 2017

Don,

Here is the link to the keynote from last year’s statewide conference. I found it interesting how the social engineering and the use of social media played an important part in Obama winning the election.

Enjoy

Rob

November 8, 2016

Here is an awesome visual graphic of the time and size of data breaches going back to 2004.  It is an interactive graphic that you can filter out certain types of organizations, sensitivity of the data, or method of leak. Click on the graphic or follow the link below t...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare