In our last post we looked at the eleven must have items that a company ought to have in place to meet the bare minimum of cybersecurity essentials. In today’s post we are looking at another ten highly recommended cybersecurity practices.
- Beware of emails bearing links or attachments, or that are requesting personal information, user credentials, or credit card or banking information. It is a good practice to call the sender to confirm the contents on any attachment or the destination ...
NOV


So the Rosetta spacecraft has successfully mated with Comet 67P/Churyumov-Gerasimenko (aka ChugGer). Well except for the part where the lander is in a shadow and the solar panels are not getting enough light to charge the battery. Oopsy! One of the many interesting new things we are learning is that this particular comet is “singing.” And they said “in space no one can here you scream.” I guess not. Anyway, drift ...

