You can take a number of steps to maximize cloud security, hence yielding more protection. It is vital that the people in charge need to have a clear battle plan. Identifying who is responsible for cyber security is a good place to start. Is it the IT department, the company executives, or an outside agency? The […]
Author Archive for: mark
About Mark Maiville
Over 35 years experience in IT in a wide range of focus areas: systems programming, data center management, research and development in data dictionaries, graphics, data modeling, relational database research, realtime systems modeling and development, CASE tools, reverse engineering, code reuse libraries, process analysis and modeling, security research (DCE, Kerberos, PKI systems, encryption research), middleware, program management, project management, network management and design, disaster recovery and business continuity planning, security engineering and management.
Specialties: Information and physical security, investigations, interrogations, Disaster Recovery and Business Continuity, application and security architecture, data and process modeling, System Development Life Cycle, facilities management, building and managing high performance teams, and international real estate.
Entries by Mark Maiville
With a constantly evolving technological landscape, education has embraced digital connectivity and innovation. This connectivity provides students, educators, and researchers with access to extensive data, real-time interaction with faculty, and more. Unfortunately, however, cybersecurity for education has become increasingly troublesome, as data breaches and ransomware attacks become more common. Why Students? It’s easy to assume […]
The USA is still a world power and it remains the strongest. But this could change, and our enemies would revel in our downfall. The good news is that we have a resolve to preserve our way of life, and compassion to protect our allies. American has a cyber mission force and this article explores […]
It wasn’t that many years ago the word, “Cybersecurity,” did not exist, except perhaps in a science fiction script. Now in 2017, the word is as common as “apple pie.” Actually, I’m not sure the last time I heard apple pie mentioned. This article will help you appreciate the military cybersecurity threats in the world, […]
In today’s business world, cyber attacks are becoming ever more prevalent and vicious. As information systems and technology grow more sophisticated, so do the hackers who attempt to infiltrate these systems. Evidenced by security breaches within large organizations like Target, Verizon and Sony Pictures, a cyber attack can have devastating effects on a company’s ability to conduct business, maintain the trust of its customers, and […]
Ransomware is a particularly insidious form of cyber terrorism. It relies on extorting a victim for ransom while holding a seized information system – and its data – hostage. In 2016, the FBI warned of the increase of ransomware attacks on companies throughout the U.S. The number of attacks rose an estimated 167 percent from 2014 […]
Phishing attacks are one of the oldest examples of cyber crime, and they’re still going strong. In 2015, there were approximately 9,500 phishing attacks, and about 10 percent of them resulted in a data breach (2016 Verizon Data Breach Investigation Report). Below are some of the more common types of phishing and three ways to avoid […]
One of the key national security issues to emerge during the 2016 U.S. presidential election was cyber security. As our world becomes more interconnected, the issue of online safety and security has never been more important. Throughout the presidential campaign, President Trump discussed the significance of cyber defense and possible U.S. weaknesses. He addressed some […]
How organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era. This report examines the approach that could be taken. The report GSISS is thorough and can aid any organization. Think broadly about cybersecurity privacy Most businesses today are fundamentally digital, and software is becoming the backbone of operations, […]
18115 US Hwy 41 North
Lutz, Florida 33549-4481