Information Security Leader, Author, Instructor and Speaker

Default utility Image

5 Ways to Update An Agency’s Incident Response Plan Quick, find a copy of your agency’s cybersecurity incident response plan. Pull that binder off the shelf or call up …Continue reading →

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

The VPN Is Obsolete. Here’s What to Do Instead. The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →

Default utility Image

Secure Your VPN, No Matter What Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

How to Stop Phishing Attacks Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

IDC PlanScape: Privacy Engineering “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →

Default utility Image

Tech Tips for Colleges Using Zoom for Remote Learning Last summer, I had the opportunity to teach an undergraduate course in my university’s online summer program. I took a …Continue reading →

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

Best Practices for Ensuring Data Security in the Cloud Cloud solutions offer virtually limitless potential to educators. From interactive learning management systems to parent communication portals, cloud-based technologies provide …Continue reading →

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple