What is ICS and SCADA?

The term critical infrastructure is regularly a topic of discussion within the topic of cybersecurity. In the case of most critical infrastructure, there is a reliance on operational technology known as Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems. Operational technology is not a term that is familiar to many individuals,

The real threat of ransomware

When it comes to information security, there is an abundance of threats to worry about.  Certain threats have a high public awareness.  Some of these threats are typical viruses that can be caught by anti-virus, scam emails trying to get you to provide private information and even spam phone calls.  In recent years there has

Securing your wireless network

Wireless security is an important aspect of most people’s lives today.  There are multiple methods used to ensure that the data traversing wireless networks stay safe.  Likewise, there are many ways that a wireless network can be misconfigured.  This post will provide some basic tips and tricks to secure your home wireless network without needing

The risks of the Internet of Things

The Internet of Things (IoT) is a term which is only a few years old.  You may be asking yourself, what exactly is IoT?  When defining IoT, the image to the left provides a good high-level explanation of the primary different groups of IoT and IoT devices. Many of us experience IoT devices on a

What is cybersecurity?

Several years ago cybersecurity primarily involved the security of computers and networks.  These efforts focused heavily on corporate environments and did not deal much with consumers.  Today the world is different.  We have stretched our ability to connect devices and having done so, require to consider cybersecurity implications for businesses and individuals alike. So what