More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Why We Need World Password Day

    The Human Factor: 5 Security Blunders People Keep Making Today is World Password Day. Yes, I’m serious, and yes,...

    Ransomware Is Everywhere, But Few Are Prepared for an...

    Top 5 Places Your Enterprise Data Is at Risk Ransomware is everywhere. I’ve talked at length about the ransomware...

    IT Pros Say Wearables Their Greatest IoT Security Threat

    The 5 Essential Traits of Digital Innovators Are we on the edge of an explosion of the Internet of...

    Verizon’s Data Breach Investigations Report Shows Not Much Has...

    6 Cyber Secrets Setting You Up for Betrayal I was invited to sit in on the reveal of the...

    Cybercrime as Big Business

    5 Ways to Keep Cybersecurity on Track While on Vacation Cybercriminals are on a mission. They want to take...

    IT Professionals Balk at Backdoors but Aren’t Diligent About...

    Security Threats: 5 Common Network Blind Spots The fight between Apple and the FBI brought the concept of using...

    Unclear Sense of Ownership Hurts API Security

    Security Threats: 5 Common Network Blind Spots Application programming interfaces (APIs) are the backbone of the digital world, and...

    Government’s Approach to Cybersecurity Is Mixed

    What Does 2016 Hold for the Evolving Security Landscape? I read today that President Obama has created a cybersecurity...

    Cyber Terrorism Is a Real Threat for the Near...

    Security Threats: 5 Common Network Blind Spots As if the health care industry isn’t having enough security problems, is...

    Poor Mobile Device Security by Doctors Puts Patient Data...

    Study Pinpoints IT Security's Top Data Security Concerns The U.S. Department of Health and Human Services put together a...

    Panama Papers Leak Raises Security Questions

    The Best Security Advice from Leading Experts My plan today was to continue my conversation about security in the...

    Vulnerabilities Found in Medical Devices: Health Care Security Continues...

    Health Care Data Breaches: 5 Tips for Protecting Sensitive Information Security within the health care industry continues to get...