Evan Morris

Evan Morris

Network Security Manager
Joined on June 27, 2018
Total Post Views: 52,167

About

Known for his boundless energy and enthusiasm. Evan works as a Cyber Security Analyst, an avid Blog writer, particularly around Technology, Cybersecurity and forthcoming threats which can compromise sensitive data. Having vast experience of ethical hacking.

Except where otherwise noted, all postings by Evan Morris on CircleID are licensed under a Creative Commons License.

Featured Blogs

Businesses Beware: Cybersecurity Awareness Varies Based on Job Function

Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more

Big Data’s Role in Helping Shipping Firms Weather the Supply Chain Crisis

When it comes to the economy, the global supply chain was one of the biggest casualties of the COVID-19 pandemic. Port closures and soaring infection rates hampered logistics providers' ability to schedule deliveries and predict risks. In turn, manufacturers' demand projections were challenged, leading to empty shelves worldwide. A lack of shipping containers has affected supply chains, with shippers scrambling to find usable containers before they disappear into service. more

3 Most Scary Attacks that Leaked Personally Identifiable Information (PII) of Millions of Users

Cybercriminals are increasingly targeting Personally Identifiable Information (PII). The reason being "data is the new gold" in this digital world, and the more sensitive some data is, the more value it has. There is no more sensitive data than personally identifiable information because it contains enough information to identify you digitally. Examples of personally identifiable information include name, email, contact number, address, social security number, tax file number, banking or financial information, and more such data that helps identify you. more

Overcoming Obstacles to Full-Scale Business Intelligence Adoption in 2021

Data analytics isn't just for large organizations anymore. As businesses and community collectives increasingly move their operations into digital spaces, the vast amounts of data being collected pose an opportunity for them to get to know their stakeholders better. While the security implications of this migration are hard to be taken lightly, the potential for game-changing insights is likewise enormous.  more

Do Your Analytics Efforts Expose Your SQL Data Sources to Attacks?

Structured Query Language (SQL) continues to be quite relevant today. Many organizations still use SQL database systems, and it still ranks as the top in-demand language in tech job postings -- even in 2020. Companies are also increasing their analytics and business intelligence efforts, where SQL skills come in as quite handy. SQL queries allow you to pull key information from databases quickly. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more