More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Does Education and Tech Savviness Put You at Greater...

    I’m all about being educated and understanding the risks involved every time you connect to the internet or access...

    By Not Reviewing Mobile App Policies, Users Put Themselves...

    The other day, I downloaded an app that I know will make a particular task much easier. I also...

    Security Pros Don’t Follow Their Own ‘Change Password Frequently’...

    If it’s been a while since you’ve changed your passwords, especially on your social media accounts, don’t feel too...

    How and Why Companies Are Incorporating the Power of...

    IBM Watson was introduced to the average person years ago when the cognitive computing platform went up against game...

    After 10 Years of Writing About Cloud Security, Concerns...

    I’ve been writing about cybersecurity for a decade. I’ve been writing about the concerns surrounding cloud security for the...

    Small Businesses Continue to Believe They Aren’t at Risk...

    I’ve been writing about security for so long now that very little surprises me – except for this: The...

    How Wearable Devices Are Creating Innovation in the Workplace

    As wearable devices evolve, they will take on more functionality, especially within the workplace, potentially affecting the data within...

    Why Your Business Must Be Prepared for Security Incidents

    As I’ve said many times, cybersecurity seems to be more about reacting than acting or being proactive. Now, a...

    Where Is Cybersecurity Headed in 2019?

    We haven’t even finished the first quarter of 2017, and already one publication is calling this the worst year...

    Secret Service Laptop Theft Should Serve as Security Wake-Up...

    Cybersecurity isn’t just about securing the data on the network. It’s about securing the data anywhere on any endpoint,...

    Twitter Hack Shows Dangers of Third-Party Access

    Even though I don’t use it as much as I should, I’m a big fan of Twitter. I like...

    Verizon’s Data Breach Digest Uses Case Studies as Security...

    Verizon’s annual Data Breach Investigations Report (DBIR) is one of the most respected studies on cybersecurity, cited by security...