More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Building Enterprise App Store for BYOD Apps

    IT departments are looking for any way possible to gain more control over the devices that are connected to...

    Dual Threat Coming from Ransomware and DDoS Attacks

    Data-Centric Approach Starves Data-Hungry Cybercriminals The FBI advised against paying the ransom when it was hit with a ransomware...

    The Struggle to Protect Mobile Devices from Malware

    Enterprise Mobility Management Myth Busters: Users vs. IT Reality A serious struggle is going on to protect mobile devices...

    Four Years After the Breach, Dropbox Admits It May...

    Were you one of the millions of long-time Dropbox users who received an email that warned you’d be prompted...

    Employee Security Hygiene Failing as Ransomware Gets Worse

    I typed “ransomware news” into Google today, and found these three items:Ransomware called Fantom poses as a critical Windows...

    Passwords Aren’t Safe from Hackers

    Top 6 Trends that Impact Your Security Posture According to a new survey, it really doesn’t matter how strong...

    9 Successful Digital Disruption Examples

    Digital disruption is using technology to transform everything about the way businesses are run and the way they interact...

    Digital Disruption Meaning & Impact

    Data is the driving force for the way we work, play, and interact with each other, so much so...

    Election Security Comes Down to Outdated Software

    Cyber Crime Report Finds Old Breaches Led to New Breaches In the spring, I reached out to the last...

    The Increase and Impact of Cybercrime’s Costs

    9 Rules for Digital Transformation in the Enterprise In 2005, cybercrime cost the average company $24,000. In 2015, the...

    Employees Continue to Fall for Phishing Bait

    5 Security Steps to Protect Users from Ransomware What would you do if nearly a third of your employees...

    Sage Breach Illustrates Damage Malicious Insiders Can Cause

    I’m often asked to provide an example of an insider threat. I think it is because no one likes...