-
May 22nd, 2014Category:Read More »
In the century and a half Memorial Day has marked the May calendar, the occasion has collected many happy traditions, from afternoon baseball, to evening barbeques to warm nights welcoming summer. Yet, as we celebrate the long weekend with friends and family, within the peaceful borders of our country, we ask that everyone take a moment to remember those who gave so much while asking for so little.
-
May 15th, 2014Category:Read More »
On a mid-May weekend, just before summer unfurls itself on Memorial Day, charity is heading home for NJVC.
NJVC is proud to be the military appreciation sponsor at Chantilly Day 2014, a civic celebration for the Fairfax County corridor that the Smithsonian's Air & Space Museum's Udvar-Hazy Center as well our corporate offices call home. In addition, NJVC is also sponsoring a pair of STEM grants for area high schools, to further their initiatives in Science, Technology and Math, to be awarded at the event.
-
May 6th, 2014Category:Read More »
Anyone who ever told you not to judge book by its cover never picked up a copy of Verizon's latest Data Breach Investigations Report (DBIR).
The 2014 edition of the benchmark yearly volume covers 57 pages of text and 1,367 discrete breaches among 63,437 security incidents in 2013, yet the most important two numbers are lifted right from the cover: 92 and nine.
Of the more than 100,000 incidents investigated in the decade Verizon that has published the report, 92 percent fall within nine attack patterns.
-
April 11th, 2014Category:Read More »
The most important element in a successful cyber security career will never be found in a position description, directly evaluated during a year-end review or taught in a college course.
Nothing trumps passion for the subject matter and passion for continuous learning.
-
March 10th, 2014Category:Read More »
Chuck Norris doesn’t need cyber security. His IT enterprise sits behind his own custom-built firewall. Or as you probably call it, the sun.
Norris, the consummate tough guy who did for roundhouse kicks to the chops what Microsoft did for operating systems, celebrates his 74th birthday today (or, more accurately, as one Twitter wag posits, 74 celebrates its association with Chuck Norris). The happy occasion lit up social media as well as our cyber security staff meeting with proposed new Chuck Norris facts.
-
February 23rd, 2014Category:Read More »
The winter games have always been a frozen classroom of great life lessons.
In 2014, we learned that sport is again the finest form of diplomacy, that the combination of athleticism and artistry calibrated by gravity is nothing short of awe-inspiring and that all hotels in Sochi are apparently managed by Norman Bates' holding company.
-
February 13th, 2014Category:Read More »
Candy hearts are a Valentine's tradition. So too should regular checks of your cyber security posture be a regular tradition for your IT enterprise.
So, to meld one great one tradition with another, NJVC offers seven cyber talking points in candy heart form.
We don't advise printing them out and eating them. Then again, you might not be able to tell the difference.
-
February 6th, 2014Category:Read More »
Meeting HIPAA regulations is a requirement for HIPAA compliance, but as NJVC Cyber Security Principal Robert J. Michalsky said at the 22nd National HIPAA Summit, it's only a start. To protect patient data with the same zeal doctors protect their well being and avoid HIPAA-violating breaches, healthcare provider organizations must adopt a holistic cyber approach, starting with simple cyber hygiene. Review the slides of his presentation below.
-
January 27th, 2014Category:Read More »
For about half of all Americans, your stove may be teaching you something invaluable about data privacy. Or perhaps it’s your heating system or outdoor grill.
For roughly 70 million households, the use of natural gas isn’t just a way to keep warm or a tool to learn that cleaning S’mores from fireplaces is a task fit only to produce great clouds of profanity; it’s a lesson that data privacy begins with data awareness and a holistic review of your enterprise.
-
January 9th, 2014Category:Read More »
Every new year, individuals resolve to improve themselves somehow, by, say, vowing to lose weight, watch less TV, save money, or, most commonly, read more cyber security blogs. For individuals and our host of foibles, there are dozens of beneficial ways to accomplish self-betterment, most equally vital.