Michelle is a freelance technology writer. She has created technical content for a range of brands and publications such as: IBM Security, GE Digital, HP Enterprise, TechTarget, & Business Insider.
Migrating to Authory
I'm migrating my writing portfolio to Authory. Please see my latest work at authory.com/tinym.
Cybersecurity for Healthcare: Addressing Medical Image Privacy
Medical imaging devices have greatly improved patient care and become a critical part of modern medical treatment. But, these devices weren’t always connected in ways they are today. Today’s tools are digital, networked with other devices and can be reached through a computer workstation. As such, more cyber threats can pose harm. So how can equipment makers and users build better cybersecurity for healthcare into imaging equipment?
One problem that prevents inclusion of security in the early...
The Dangers of QR Codes
Quick Response (QR) codes are experiencing an increase in popularity as brands and shop owners move to offer a more flexible customer service experience during the COVID-19 pandemic. The codes provide a quick way to get to a website address or save other text-based information to a mobile device. (Read also: An Introduction to QR Codes.)
QR codes can be handy for saving keystrokes and eliminating typos. They make it easy to respond to marketing campaigns or gather more information about a pro...
Top 5 Programming Languages For Machine Learning
Machine learning is no longer regarded as a theoretical area of Artificial Intelligence research. Machine learning has become commercially viable because of advances in data storage and retrieval innovations as well as increased speed and performance of modern processors.
With these advancements, systems are able to analyze vastly larger datasets than ever before. Hardware capabilities alone haven’t brought about renewed interest in and commercial success from the field.
Statistical computing...
Integrating Security Awareness Training Into Employee Onboarding
Training your team on security awareness is an essential part of a successful security program. And, new employee onboarding is an optimal time to introduce your staff to your security best practices.
This is in large part due to the fact that they likely won’t know your company’s protocols for secure information nor how to securely navigate internal systems. Therefore, new employees will need guidance through the best approach to systems and processes. Here are some keys ways to incorporate ...
How to convert AMR to text online
Adaptive Multi-Rate (AMR) is a compressed audio file type designed to optimize human speech data. AMR audio files were originally created for use on 3G phones. This file format has been around for a while; it was developed b...
Learn How to Secure Personally Identifiable Information, Now
As more work shifts to remote, organizations continue dealing with security challenges. Employees are now connecting to internal network resources from varied devices, and many may be connecting with personal devices. Working from off-site locations presents more chances for accidental and malicious data disclosure alike. Protecting personally identifiable information (PII) in difficult environments becomes ever more important.
Personally identifiable information is an attractive target. The ...
How Should I Start Learning About AI?
Artificial Intelligence (AI) continues to experience considerable growth. According to the Gartner 2019 CIO survey, enterprise adoption grew 270 percent over four years. Artificial intelligence is primarily used for research and development but has practical applications across multiple sectors.
A 2019 O’Reilly survey reveals AI is used for information technology (IT), customer service, marketing/advertising, facilities/operations management, and more. A high percentage of respondents (85%) r...
Build a Culture of Holistic Risk Awareness Throughout Your Workforce
Employee training programs have changed little over the years, and mandatory compliance training modules aren’t widely renowned for their entertainment value. Your employees know this, which is why the annual email titled “URGENT: Mandatory security training” is only opened by a fraction of the workforce.
State and Local Government Cyberattacks Timeline
I created summaries for approximately 20 items in this interactive piece.
From the intro: State and local governments face malicious actors who target personal information and key services, endangering both citizens and critical infrastructure. Ransomware alone affected over 100 governments in 2019, per Recorded Future. Increasing attack volumes plus lack of funding, skills and awareness necessitate stronger state and local government cybersecurity.
6 Security Awareness Gifts for the Cybersecurity Unaware
Better personal security in everyday life isn’t something everyone considers — at least, not until something goes wrong. Securing home devices and personal accounts can be daunting for those who just aren’t that interested in the devices or cybersecurity. Learning the basics of personal cybersecurity is not the most appealing activity to everyone, and getting lectured by tech-savvy family members isn’t either.
Fortunately, there is a better way to teach cybersecurity. Giving the gift of bette...
How to Protect Your Organization From Evolving Phishing Attacks
Phishing remains one of the top threats to enterprise IT. According to a recent Akamai report, “Phishing Is No Longer Just Email: It’s Social,” phishing is responsible for as many as 93 percent of security breaches. Email phishing attacks continue to rank highest among attack methods, but criminals are now adopting modern communication and collaboration tools and services as well.
How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home
Technology enables employees to work from the office, from home, during their daily commute and pretty much everywhere in between. Companies, however, have little control over security between the home and the office. Employees may choose to work from unsecured Wi-Fi networks in public places or when working remotely, for example, when we all know that secure Wi-Fi is best.
How to cancel a Hulu subscription on your Android device in 4 simple steps
You can easily cancel your Hulu subscription on your Android within the Hulu mobile app.
How to permanently delete files from Google Drive on your Android device
You can easily delete a file from Google Drive on an Android with several taps.