Eric Jacksch
Privacy: Why Should I Care?
They say a week is a long time in politics; a year is certainly a long time in security. Every…
Bill C-13: Privacy Lost
Proponents of mass surveillance attempt to dismiss privacy concerns by emphasizing metadata collection, as if tracking the source and…
Cloudy with a chance of…
1) Where is their data being processed and stored?2) What laws and regulations apply? 3) Who has access to the…
Look beyond BYOD
Today, the computing landscape has evolved considerably. We frequently share sensitive information with subcontractors and business partners who use their…
Rapid cybersecurity risk assessments: A primer
Security risk assessments allow us to make reasoned decisions about security budget allocations. We’re not always right, but that shouldn’t…
Send me a postcard?
For those who haven’t been following the case, Lavabit was served with a so-called “pen register” order in June requiring…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected