Author Archives: Allan Pratt

About Allan Pratt

Technology and cybersecurity professional with focus on tech news, cybersecurity, networking, infrastructure, data protection, consumer electronics, and social media.

Did You Hear? Foursquare Announced a New Privacy Policy!

How often do you read email notifications from your frequently used social media sites? When Facebook makes a change to its news feed, how soon are you aware of the change, and better yet, do you care? When Twitter updates … Continue reading

Posted in data protection, Data Security, Email, Online Privacy, Online Security, Social Media, Terms of Service | Leave a comment

Top 10 Quotes About Information Security

If you spend your time living and breathing information security, there are some quotes that you share with others on a regular basis. Here are some quotes that provide insight, reminders, and tips. [1] Scott Nealy, co-founder of computer technology … Continue reading

Posted in Business Process, data protection, Data Security, Management and Technology, Network Security | Leave a comment

Who Authorized This Email?

I recently received an unusual email message to my main email account inbox, and my immediate reaction was, “This would be a good topic for a blog post.” As a member of the infosecurity industry, I practice what I preach … Continue reading

Posted in Cybersecurity, Email, mobile payments | Leave a comment

Irony and Cyberbullying

Years ago, bullies were big and strong. They pushed us down the stairs, hit us in the nose, and stole our books. Today, they sit at computers or use mobile devices and have evolved into a new type of bully … Continue reading

Posted in Cyberbullying, Social Media | Leave a comment

Cars Hit a Cybersecurity Speedbump at the #LAAutoShow

As a technology blogger and gearhead, I was fortunate to get up close and personal to the newest cars and technologies during one of the media days before this year’s Greater Los Angeles Auto Show. What I found, however, was … Continue reading

Posted in Cybersecurity, Internet of Things, Mobile Malware, Tech Equipment | Leave a comment

When Art Imitates Life – A Review of “I.T.” the Movie

Recently, I saw “I.T.” the movie starring Pierce Brosnan as a visionary CEO named Mike Regan. In the movie, Regan is planning to take his company public, and soon after the movie begins, Regan makes a presentation to a large … Continue reading

Posted in Disaster Recovery, Internet of Things, Mobile Computing, Network Security, Online Privacy, Online Security, Tech Equipment | Leave a comment

Why the Apple-FBI Feud Affects YOU!

While the eyes of everyone in the technology sector watched the Apple-FBI feud about a key to unlock a terrorist’s iPhone, you should have been watching too. You might wonder why this situation affected you, and the reason is simple. … Continue reading

Posted in data protection, Data Security, Mobile Computing, Online Privacy, Online Security, Privacy Rights, Tech Equipment, Terms of Service | Leave a comment

Five Social Media #Security Tips

Many of the previous posts on this blog have been geared toward midsize businesses to assist them with their information security strategies and to keep their data safe. However, with the widespread use of social media, this post focuses on … Continue reading

Posted in Cybersecurity, data protection, Data Security, Email, Social Media | Tagged , , , , | Leave a comment

When Making Your New Year’s Resolutions, Don’t Forget Your InfoSec Resolutions

There are the common New Year’s resolutions like unplugging more often, planning more vacations or staycations, reading more books, writing a book, and losing weight. But, in today’s connected and always plugged in world, it’s easy to ignore technology. So, … Continue reading

Posted in Business Process, BYOD, Cloud Computing, corporate data, Cybersecurity, Data Breach, data protection, Data Security, Disaster Recovery, Management and Technology, Network Security, Online Security, Tech Equipment | Tagged , , , , | Leave a comment

Three Security Concerns for 2016

As we near the end of 2015, what will 2016 look like in the information security sector? Undoubtedly there be an increase in data breaches across all industries, but will businesses take the high road and inform their customers and … Continue reading

Posted in Business Process, BYOD, corporate data, Data Breach, data protection, Data Security, Internet of Things, Mobile Malware | Tagged , , , , | Leave a comment