Information Security Leader, Author, Instructor and Speaker

Default utility Image

How to Stop Phishing Attacks Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

IDC PlanScape: Privacy Engineering “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →

Default utility Image

Tech Tips for Colleges Using Zoom for Remote Learning Last summer, I had the opportunity to teach an undergraduate course in my university‚Äôs online summer program. I took a …Continue reading →

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

Best Practices for Ensuring Data Security in the Cloud Cloud solutions offer virtually limitless potential to educators. From interactive learning management systems to parent communication portals, cloud-based technologies provide …Continue reading →

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Default utility Image

Adapt These Settings for a Faster Windows 10 When Microsoft launched Windows 10 in 2015, the company set a goal of hitting 1 billion installed devices within three …Continue reading →

Default utility Image

Plan Well for a Hybrid Cloud Environment and See Efficiencies Early on, cloud computing promised to simplify enterprise computing, transferring mundane work to service providers. But agencies that have not …Continue reading →

Default utility Image

Lessons Learned from Six Major Data Breaches “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →

Default utility Image

Security, Privacy and Confidentiality: What’s the Difference? Campus administrators and faculty understand the importance of protecting sensitive student information. The past two decades have brought us a variety …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple