19 Posts

Mark Stone

Mark Stone is a Hubspot-certified content marketing writer specializing in technology, business, and entertainment. He is a regular contributor to Forbes BrandVoice and Dell Technologies Perspectives and also helps a large Canadian telecom with sales and technical documentation. Earlier in his career, he was a CISSP network security analyst for the government. Mark lives in beautiful Kelowna, BC with his wife and two black cats. He may or may not watch too much TV.

Written By Mark Stone

The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security

Healthcare security is going to play a huge role if the utopian vision of a purely digital healthcare ecosystem is going to be realized.

It’s Time for an Automotive Cybersecurity Wake-Up Call

The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world's largest banks.

What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising?

Malvertising is one more threat that will keep your IT decision-makers up at night, but any company with a protection-first mindset should be able to remain ahead of the curve.

Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask

With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns?

We Need to Talk About NIST’s Dropped Password Management Recommendations

NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.

6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts

To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths.

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work.

What Are the Risks and Rewards Associated With AI in Healthcare?

While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors.