Information Security Leader, Author, Instructor and Speaker

Default utility Image

Secure Your VPN, No Matter What Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

How to Stop Phishing Attacks Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

Tech Tips for Colleges Using Zoom for Remote Learning Last summer, I had the opportunity to teach an undergraduate course in my university‚Äôs online summer program. I took a …Continue reading →

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

Best Practices for Ensuring Data Security in the Cloud Cloud solutions offer virtually limitless potential to educators. From interactive learning management systems to parent communication portals, cloud-based technologies provide …Continue reading →

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Default utility Image

Adapt These Settings for a Faster Windows 10 When Microsoft launched Windows 10 in 2015, the company set a goal of hitting 1 billion installed devices within three …Continue reading →

Default utility Image

Plan Well for a Hybrid Cloud Environment and See Efficiencies Early on, cloud computing promised to simplify enterprise computing, transferring mundane work to service providers. But agencies that have not …Continue reading →

Default utility Image

Security, Privacy and Confidentiality: What’s the Difference? Campus administrators and faculty understand the importance of protecting sensitive student information. The past two decades have brought us a variety …Continue reading →

Default utility Image

Don’t Be Victimized by a Supply Chain Attack Six years ago, a major U.S. retailer suffered one of the most famous data breaches in history. Attackers compromised the …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple