Operation Fitbit

The Chinese philosopher Laozi gave this saying to history…”A journey of a thousand miles begins with a single step.”  Two thousand five hundred years later, give or take a century, modern technology makes it simple to count those steps. And, thanks to companies like Fitbit, counting to 10,000 steps each day has become something between[…]

Treat Your Data Like Cash

How annoyed are you when you find out you lost some cash?  Whether it is a few bucks in your jeans pocket or that “emergency stash” under the mattress, losing that “cold hard cash” is a feeling that always twists your stomach.  Sometimes you blame yourself.  Sometimes you blame others.  Depending on the amount lost,[…]

Warm Holiday Wishes

As the holiday season gathers steam, we traditionally pause to take stock of our many blessings. This year we can find one in the just released U.S. National Security Strategy.  It appears we’ve won the war on climate change, and climate change is no longer a national security threat, so a long winter’s nap should[…]

An Eye on GDPR

There is a lot of talk about the European Union’s General Data Protection Regulation (Regulation (EU) 2016/679).  And rightly so, because it will impact a great many organizations, many of which reside in the U.S.  Set to come fully into effect May 25, 2018, the GDPR has understandably caused a lot of headaches because it[…]

Prepare to Defend Your Reputation

“Lose money and I will forgive you. Lose even a shred of reputation and I will be ruthless. …Wealth can always be recreated, but reputation takes a lifetime to build and often only a moment to destroy.” Warren Buffet There is widespread acknowledgement that corporate reputation has significant value.  Calculating that value with any precision is a bit more dicey.[…]

Beary Scary

We are slowly easing through the languorous days of fall, reluctantly trading daylight for darkness,  feeling the crunch of leaves, inhaling the smoke-tinged air that marks the fullness of the season. Soon it will be All Hallows Eve, a night when witches ride high across cloud-strewn skies and spirits restlessly roam the earth below. They will[…]

Have We Normalized Theft?

When did cyberattacks truly begin to concern us?  Was it the Morris worm of 1988?  One would have wished it was, but clearly this is not the case.  How about the 2008 cyberattack on USCENTCOM?  That worm, likely injected into the DoD system through a single USB key, took about 14 months to clean up[…]