More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    How Does Your Company Stand in Cybersecurity Readiness?

    Cyber Crime Report Finds Old Breaches Led to New Breaches How do you think your company fares in cybersecurity...

    New Strains of Ransomware Show New Tactics

    5 Security Steps to Protect Users from Ransomware A new variant of ransomware shows just how low and dirty...

    Security Skills Gap Has a Direct Impact on Organizations’...

    5 Steps for Proactive Cyber Risk Management In January 2016, Forbes reported on the job prospects for those interested...

    It’s Easy to See Why Ransomware Is the Security...

    5 Security Steps to Protect Users from Ransomware I didn’t get to attend security conference Black Hat this year,...

    Why Cloud Security Remains a Challenge for Most Organizations

    Securing AD for Hybrid Cloud Environments A new study by Ponemon Institute and Gemalto has gone a long way...

    The Missing Cybersecurity Discussion

    Scammers Go Phishing: Business Email Compromise on the Rise I’ve been following the coverage of the Wikileaks release of...

    HHS Addresses the Rampant Ransomware Problem in Health Care

    Health Care Data Breaches: 5 Tips for Protecting Sensitive Information We know that ransomware is a menace for just...

    Are We Prepared for the Coming Threats with the...

    5 Steps for Proactive Cyber Risk Management Stephen Cobb from ESET wrote a blog post last week discussing the...

    iPhones Are Safer than Android, but Still Have Malware...

    How to Minimize the Impact of BYOD and Improve Security Last week, I talked about Pokemon Go and security...

    More than Half of Companies Are Failing at PAM...

    When the Boss Leaves, What Data Is at Risk? I would think that the one area in the network...

    Businesses Failing to Protect from Double Hit: External Attacks...

    5 Steps for Proactive Cyber Risk Management We often talk about different threats as if they stand alone: insider...

    Pokemon GO: Security Nightmare for BYOD

    How to Minimize the Impact of BYOD and Improve Security If you didn’t think your company needed to put...