Due in part to recent cybersecurity disasters involving major U.S. companies, Discernum has authored a researched-based report providing fundamental cybersecurity recommendations.
In addition to cellphones, laptop and desktop computers are typical repositories of highly personal and private information. While Apple's macOS operating system is a relatively secure platform in its default state, there are a few steps you can take to elevate and maintain that security.
Discernum’s Security Risk Management Triangle (SRMT) is a thinking aid for risk analysts and security planners.
The concept is that risk can be mitigated by acting on any one of the triangle's three angles:
Angle 1. The location of the asset
Angle 2. The intent, capability, or existence of the threat
Angle 3. The presence of vulnerabilities
Espionage is illegal and carries consequences ranging from termination of employment to the death penalty, so why do people do it? The motives vary, but generally fall into specific categories. These categories are money, ideology, coercion and ego. They are easily remembered by the acronym M.I.C.E.
The unfortunate March 22nd 2017 terrorist incident in London occurred one year after the 2016 Brussels bombings, which brings about some questions: Are terrorist attacks more likely to occur on anniversaries of previous incidents? What about on holidays or other significant dates?