How to Protect Yourself from Identity Theft (Besides Freezing Your Credit) – October 2017 – NBC News

Credit frozen? Here are five more things you can do to protect your personal information today.

Hacking the internet of really, really big things – April 2017 – Crain’s Chicago Business

Industrial machinery is a growing cybersecurity risk for manufacturers as they link heavy equipment to company networks, making it possible for critical business information to be stolen.

The Payoff – Feb 2017 – Leader’s Edge Magazine

In May 2016, a hacker seized control of computer systems at Kansas Heart Hospital in Wichita. The hospital could not regain control unless it paid the hacker a ransom—an amount reported to be “small.”

Do Data Centers Have A Future In A Multi-Cloud World? – January 3, 2017 – Forbes

As more organizations migrate storage, processing and data to different cloud environments and service providers, on-premises data centers just aren’t what they used to be. They’re still there, but they’ve lost a few inches in height.

Travelers, beware! Hacking lurks in plugs and ports – December 20, 2016 – USA Today

We’re all guilty of bringing too many gadgets along when we travel. But using local Wi-Fi and public outlets can put you at risk for cyber threats. Here’s how to keep your personal information private while traveling.

EMV migration delay doesn’t let gas stations completely off the hook – December 8, 2016 – CSO

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t mean that gas stations can now relax their EMV upgrade plans.

Chicago Theater customer data may be compromised by data breach – November 22, 2016 – WGN TV

A massive data breach was reported Tuesday by the owner of the historic Chicago Theater.

“Hacker Lab” Event Shows How Cyber Criminals Attack Homes – November 16, 2016 – Claims Journal

The October 13 workshop in New York City mounted a remote cyber-attack on an Internet-connected model home inside the American Modern Insurance Group claims training facility in Ohio. The event demonstrated in real time how hackers choose their targets, enter a system, and the harm they can do once they infiltrate a home.

Robots present a cyber risk – November 9, 2016 – CSO

Experts say the growing use of robots by companies such as manufacturers, retailers, healthcare institutions and other businesses can present a number of cyber risks.

How Your IoT Devices Turned Into a Zombie BotNet – October 24, 2016 – GearBrain

The flat-lining of many famous websites on Friday started right from your home. Maybe not your home—but someone’s. The Distributed Denial of Service attack (also known as a DDoS attack) started at about 7 am ET Friday, in essence turning off the valve to many web sites.

Why Seemingly Infallible File-Sharing Apps Go Dark, And What Is Being Done To Stop It – October 19, 2016 – Forbes

We’ve taken for granted the ability of file-sharing apps to pull up a presentation minutes before an important sales pitch or panel session. But what if, for some reason, the technology failed to work?

Top Tips for Protecting Your Devices From Cyberattacks – October 19, 2016 – Credit.com

Here are a hacker’s top tips for protecting your devices from cyberattacks.

7 ways to keep your smart home from being hacked – October 17, 2016 – MarketWatch

In the modern home, everything from TVs and refrigerators to baby monitors and lightbulbs can now be connected — and hacked.

Chip & Pin Technology More Secure – October 3, 2016 – WGN TV

Jerry Irvine discusses chip/pin technology.

From faces to fingerprints, keeping biometric information safe is a growing concern – August 24, 2016 – WGN TV

Biometrics are a security resources that are getting more wifely used when it comes to shopping, banking and traveling. It’s all good, unless it somehow gets into the wrong hands. It’s all biometric information and once it’s gone or stolen, how do you get it back? The answer: You can’t.

Going On Vacation? How To Protect Yourself From Online Threats – August 22, 2016 – Forbes

Connecting to a corporate network while on vacation can be dangerous — even more so than connecting while on a business trip. Vacationing employees may not be focusing on security when they’re checking email or accessing office documents. Procedures that may be top-of-mind in the workplace can take aback seat.

Cyber extortion risks increase as threats grow more sophisticated – August 7, 2016 – Business Insurance

Cyber extortion is a growing threat across industries, and particularly health care organizations, as criminals cast their nets wider using increasingly sophisticated malicious code.

6 Myths About Credit Cards — Busted – August 4, 2016 – GOBankingRates

Many cardholders hold false beliefs about how these pieces of plastic work. Here are six credit card myths, debunked.

Experts: SentinelOne Ransomware Guarantee No Replacement for Cyberinsurance – August 1, 2016 – CSO Magazine

Earlier this week, SentinelOne announced that it will reimburse customers for up to $1 million if they are hit by a ransomware attack, but some experts say that this is a marketing gimmick and no replacement for a solid cyberinsurance policy.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – PCWorld

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – CIO Magazine

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

Keeping Your Data Safe During Summer Travel – June 27, 2016 – FOX 32

Jerry Irvine discusses keeping your data safe during summer travel.

5 Tips For Staying Cyber-Secure On Your Summer Vacation – June 20, 2016 – InformationWeek Dark Reading

Summer is officially here, and with that comes vacation season. But before you go, make sure you’re following these simple steps to stay cyber-secure while you soak up the sun:

Staying Safe on the Road: Infosec for Smart Travelers – May 31, 2016 – Secure Thoughts

It is a war for your data when you travel. The irony is that many, many pages are filled with advice on how to avoid pickpockets in Rome, muggers in Manhattan, and crooked taxi drivers in Rio.  But bad as those threats to your safety and wealth may be, you have a lot more exposure to real – and huge – risks that arise with theft of your information, your identity, your banking specifics.

Mobile devices: A better route to ID security – May 31, 2016 – GCN

In the federal government, Common Access Cards and personal identity verification cards for employees and contractors incorporate biometrics and give agencies a better foundation for security and ID management than many private-sector organizations enjoy. But that wasn’t always the case.

Cybersecurity for Small Businesses: You’re Never Too Small to be Safe – May 23, 2016 – NCR Silver

You would never leave your cash register open to thieves. But are you inadvertently leaving your corporate data and your employees’ personal information open to hackers?

SDN – A Step Forward or Backward for Infrastructure Security? – May 23, 2016 (Page 31-32) – Enterprise Networking

Software-defined networking (SDN) segments the major functions of networking into the control layer and transfers all networking functionality to a control host(s), leaving only packet forwarding functions at the switch level.

Ransomware attacks prompt warnings to House members – May 11, 2016 – SC Magazine

Members of the US House of Representatives and staffers received warnings that the House network has received a rise in attempted ransomware attacks.

Digital Vulnerability: Can hackers turn your vehicle into a remote control car? – May 6, 2016 – WGN TV

It can happen. Hackers– the criminal kind — can take over your car and do anything remotely that you as the owner can do electronically.

Digital Vulnerability: Cyber security expert on preventing your social media from being hacked – May 6, 2016 – WGN TV

In today’s world of technology and social media, the security of our personal information is a huge concern.

Digital Vulnerability: How safe are you on social media? – May 5, 2016 – WGN TV

While millions, even billions, are connecting on social media worldwide, what are the pictures, the captions, the details of your page really telling about you. Could it land you in trouble or even put you in danger?

Protecting Data Wherever it Lives – May 5, 2016 – GCN

Data encryption addresses four major areas: data in motion, data stored on user devices, data stored on servers and data that is currently being used.

Stolen Passwords – May 5, 2016 – FOX 32

One of the biggest stashes of stolen e-mail passwords ever and they are all up for grabs to hackers worldwide. over 272 million stolen google yahoo! and microsoft e-mail addresses and passwords are being traded in russia’s criminal underworld. and that means it may be time for you to update your password.

Digital Vulnerability: The Dangers of Webcams – May 3, 2016 – WGN TV

This installment focuses on webcams. Could someone be watching and you’d never know it? The answer? You bet they can.Anywhere you find those tiny little lenses, someone is capable of recording, maybe even streaming video and sound of you.

Digital Vulnerability: How safe is the Wi-Fi you’re using? – May 2, 2016 – WGN TV

This is a look at what you might be giving away when you simply tap into public Wi-Fi.

Password Protection – April 28, 2016 – Independent Banker

Software can secure and manage employees’ login credentials.

Hackers Branching out to Law Firms – April 5, 2016 – Business Insurance

Hackers are moving away from a focus on obtaining personally identifiable information and more towards “soft” targets including law firms.

Health Care: Cyberattacks Spook Device Makers – April 3, 2016 – San Fernando Valley Business Journal

Cyberattack nurses security fears of device makers.

Should CIOs worry about the Internet of Hackable Things? – February 16, 2016 – CIO from IDG

From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?

Internet of hackable things? Why IoT devices need better security –February 8, 2016 – The Enterprisers Project

The Internet of Things is amazingly powerful and useful — but not always safe to use, and most organizations with IoT implementations need to do a better job of keeping them secure.

The Three Largest Cyber Security Risks of the Decade Converge: Cloud Computing, BYOD, and IoT – Enterprise Networking

Weak Authentication: Agencies Slow to Fix Security Gaps – GovTech Works

The dark side of layered security – November 13, 2015 – CSO from IDG

Layered security is currently considered a best practice for enterprises, but sometimes these layers can have unintended consequences. Our CIO, Jerry Irvine, explains in this CSO Online article.

Weak Authentication: Agencies Slow to Fix Security Gaps – November 3, 2015 – GovTech Works
Two-factor or “strong” authentication requires users to provide at least two means of identification to access a system. Learn more.

Jerry Irvine: How to protect yourself online – October 14, 2015 – FOX 32
The month of October is Cybersecurity Awareness Month, making it the perfect time to take a step back to make sure you are protecting yourself both personally and professionally.

Appetites for more: Government actions – October 1, 2015 – SC Magazine
Cybersecurity is a technical challenge. But it also usually has a legal and regulatory aspect as well.Read more.

Chip-pin credit card 101 – October 1, 2015 – WGN TV
Starting today, major credit card companies must have rolled out the new chip-pin credit cards and stores should have the technology to read those cards. Our CIO, Jerry Irvine, has a quick lesson on how it all works.

Security experts mostly critical of proposed threat intelligence sharing bill – September 10, 2015 – CSO from IDG
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA.

EMV transition will still leave security gaps – September 8, 2015 – CSO from IDG
This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments.

Cybersecurity Professionals: The Government Wants You – July 20, 2015 – IEEE USA

Federal, state and local government agencies needs tens of thousands of cybersecurity employees just to fill existing job slots.

Data explosion offers challenges, opportunities to security pros – July 17, 2015 – CSO from IDG
Big Data analytics helps companies process all this information, prioritize the most significant threats, and weed out random noise and false alerts.

NYSE trading halt an insurance coverage wake-up call – July 14, 2015 – Business Insurance

Last week’s disruption of the New York Stock Exchange because of an apparent computer glitch may not have had a dramatic impact on the markets, but it should serve as a reminder to companies.

Encryption: What Does It Protect, What Are The Risks … And Is It Enough? – July 13, 2015 – HS Today

CIO Jerry Irvine discusses if today’s encryption technology really provides the level of confidentiality required in this totally Internet connected world.

Computer glitches expose vulnerability of critical infrastructure – July 10, 2015 – Security InfoWatch
Operations at the New York Stock Exchange, United Airlines and Wall Street Journal were severely impacted by what officials say are unrelated technical glitches in their respective computer systems.

Summer Travel Scam Targets Your Points and Miles – July 9, 2015 – CIO Magazine
How sure are you that the airlines miles and hotel rewards points you’ve been hoarding for years will be there when you go to redeem them.

Cyber Expert: Potential for Insured Losses in Technical Glitches That Hit NYSE, Wall Street Journal and United Airlines – July 8, 2015 – A.M. Best
Technical problems hit the New York Stock Exchange, United Airlines and the Wall Street Journal all on July 8, but one cyber security expert said the glitches so far appear to be separate incidents.

NYSE, United Airlines Shutdowns Spark Paranoia – July 8, 2015 – InformationWeek
United Airlines and the New York Stock Exchange both experienced massive outages this morning. The causes are slowly coming to light.

New Cybersecurity Council backs info sharing legislation – July 7, 2015 – Federal Times
The U.S. Chamber of Commerce announced its new Cybersecurity Leadership Council bringing together businesses interested in promoting best practices across the private and public sector.

Who’s Winning the Mobile Payments War? – June 29, 2015 – Network World
Mobile payments haven’t taken off. Yet. Read more.

Mobile Security: The Coming Battle of Hardware vs. Software – June 18, 2015 – CSO from IDG
According to security experts, there are several paths forward to mobile payments, each with its own security implications.

The OPM Hackers Have Your Data — Now What? – June 5, 2015 – Federal News RadioFederal employees who learn their data was stolen in the recent, record hack need to take several stepsquickly to mitigate their risks.

Massive Data Breach Puts Spotlight on Shared IT Services – June 5, 2015 – Government Executive
A breach that impacted records for 4 million federal employees has raised questions about the future of shared services. Learn more here.

Top In-Demand Skills for Cloud Security – May 15, 2015 – Cyber CodersThe demand for cloud security gurus continues to grow. Click here for the must-have skills.

Don’t Assume You’re Too Small to Attract Cybercrime – April 30, 2015
You don’t need to be a multi-million dollar business to be vulnerable to a cyber attack; many small- and medium-size businesses represent an easy target to would-be criminals. Read more here.

Boards Are on High Alert Over Security Threats – April 27, 2015
Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company’s security posture and steer the conversation toward managing business risk. Read more here.

Implantable Devices: Medical Devices Open to Cyber Threats – April 8, 2015
The threat of hacking implantable defibrillators and other devices is already growing. Read more here.

Report: Breach Exposed Obama Records – April 7, 2015
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president’s schedule. Learn more.

Tech Pros Need Business Skills, Too – March 24, 2015 
Check out the latest IT job ads and you’re more likely than ever to find employers asking for candidates with a strong understanding of business operations in addition IT skills. Read more about those must have skills here.

Agencies Navigate the Identity-Based Security Ecosystem – March 6, 2015
Identity systems – and the electronic formats for managing them – have become the top priority for organizations looking to safeguard the government data attackers now target.  Learn more here.

Feds Warn Computer Users of Ransomware – Feb. 23, 2015
The FBI has issued warning about a growing type of malicious Internet software that could take your computer hostage, along with all the data stored on it.  Learn more here.

What NFV Vendors are Currently on the Market? – Feb. 18, 2015
Many data centers are on the path to NFV. How are the NFV standards and vendor offerings guiding — or challenging — implementation? Get the latest insights.

Omaha’s Scoular Co. Loses $17 Million After Spearphishing Attack – Feb. 13, 2015
Prescient CIO Jerry Irvine offers advice to help organizations guard against spearphishing.

Microsoft Packing More Patches into Fewer Bulletins – Feb. 12, 2015
Microsoft is packing more common vulnerability exposures into its critical bulletins. Learn more here.

Decoding Tech Jargon – Winter 2015 
Prescient CIO Jerry Irvine offers up this handy guide to nine words and phrases that will help your organization make smarter cybersecurity decisions.  Read the full story on page 24.

Prescient Solutions Nets Award in ADP’s “Beyond the Startup” Contest – Jan. 20, 2015
Prescient Solutions won second place in ADP’s annual “Beyond the Startup” contest. Read more here.

Why Police Need to Hack into CCTV Systems in Paris and Elsewhere – Jan. 12, 2015
What good are the millions of surveillance cameras populating private and public property worldwide, if emergency responders can’t immediately obtain real-time footage?

Building a Better Security Budget – December 26, 2014
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization. Read more.

Hack the Herald Angels Sing – December 8, 2014
What’s behind the recent hack at bebe?  Find out here.

What the Internet of Things Means for Your Business – December 3, 2014
Learn more about what small and mid-sized businesses need to know with these insights.

New Credit Card Security Rules Squelch Retailers’ Holiday Spirit – December 2, 2014
Retailers have one more thing to worry about during the year-end sales push.

Cyber Monday Scams – December 1, 2014
Buyer beware during the holiday season. Watch this First Business report to learn about the latest shopping scams.

Watch Out for These Three Holiday Shopping Scams – November 26, 2014
Whether you shop online or at the mall, look out for these three scams.

Five Reasons IT is Scared of Mobile Security – November 19, 2014
Despite the uptick in hacks, a recent study shows corporate IT isn’t investing enough in mobile security. Read why not here.

Does More Technology Equal a Safer Home? – November 19, 2014
With the influx of home automation technology comes a whole new breed of criminal for homeowners to guard against.  Find out how to defend your domain here.

27 Data Security Experts Reveal the #1 Information Security Issue Most Companies Face with Cloud Computing & Storage – November 12, 2014
Just like traditional storage and data sharing methods, cloud computing comes with its own set of data security issues. Read here for insight from the pros on the top issues.

Why Trendsetting Companies Change Course on Cloud Security – November 12, 2014
More small and mid-sized businesses are migrating to the cloud.  Find out why.

Experts: Take Stolen Email Addresses Very Seriously – November, 12, 2014

Prescient talked to Consumers Digest about the potential fallout from stolen email addresses and how to protect your accounts.  Read more here.

Changing the Security Mindset – October 29, 2014
As cyber attacks increase in number and complexity, financial services firms need to get more proactive in their security measures.  Read more here.

Business Phone Hacks – October 21, 2014
It’s easier than you think for hackers to get into your phone, and once they’re there it becomes a gateway to all kinds of private information.  View the First Business segment here.

Don’t Let the Machines Takeover: The 5 Basics of Smart Home Security — Oct. 10, 2014
Make your smart home even smarter with these security tips. Read more here.

Home Depot, Apple Cyber Attacks Highlight Variety of Methods Used by Hackers – September 14, 2014
The common denominator in both these cases is that hackers attacked the weakest link, according to Prescient CIO Jerry Irvine. Read more here.

Employers’ Wearable Device Policies Should Control and Restrict Use – September 14, 2014
A wearable device policy is a must for any company. Read what you should include in yours here.

What Does the Alleged iCloud Attack Mean for Federal Agencies? – September 2, 2014
The iCloud hack highlights concerns with federal employees accessing sensitive information on personal devices. Find out how agencies can take a smarter approach to security here.

The War Without End – September 2, 2014
Retailers face an impossible challenge when it comes to Internet security. Read more here.

First Business Looks at the JPMorgan Hack – August 29, 2014
Get insight into the hack and learn how to create a smarter password here (advance to 7:31).

Unsecured Smart Home Systems Leave Homeowners, Enterprises Vulnerable – August 26, 2014
Unsecured home security and automation systems could also serve as backdoor to hackers seeking access to a greater prize — corporate data on your smartphone.  Learn how to minimize your risks here.

Internet of Things (IoT) Poses Challenges for DevOps and Security – August 25, 2014
The emergence of IoT is driving the need for a mindset change.  Here’s what you need to know.

After Jewel, UPS, How do Consumers Stay Safe from Data Hacks? – August 22, 2014
The hacks keep coming and consumers need to get serious about their personal cyber security.  Read Jerry Irvine’s advice here.

Jewel-Osco Customers’ Credit Card Data May Have Been Compromised – August 16, 2014
Jerry Irvine shares insight with the Chicago Sun Times into the Supervalu hack and its impact on Chicagoland customers.

CISA Puts Congress in a Tough Spot – August 10, 2014
Can the Cyber Security Information Sharing Act be an effective tool against hackers and other cyber criminals? Get insight here.

1.2 Billion Passwords Compromised – Now What? – August 8, 2014
Prescient CIO Jerry Irvine has security advice in the wake of the largest hack in history.  Get it here.

Dos and Don’ts for Feds on Vacation – August 1, 2014
Prescient offers tips for federal government employees who plan to hit the road this summer.  Check them out here.

How Safe is Safe Enough? – August, 1, 2014
Small accounting firms face big cybersecurity challenges.  Read Prescient’s advice on how to minimize the risks here.

Summer Travel Cyber Security Tips For Government Employees – July 23, 2014
Vacationing as a government employee has its own set of cybersecurity concerns.  Read what to watch for and how to lessen the risks here.

Into the Breach: Midstate Experts Say Data Breaches are Inevitable – July 20, 2014
Can information sharing help companies do a more effective job at cybersecurity? Read more about this and other strategies here.

Agencies Inch Toward Solutions on BYOD – July 18, 2014
Jerry Irvine offers insight into the increasingly complex world of BYOD security for government agencies.  Read the Government Technology story here.

Cyberattacks Focus Employers on Security Certifications – July 9, 2014
What are all of these certifications and which make the most sense for you? Read more here.

Beef Up Your Security and Avoid Being a Victim on Vacation This Summer – July 8, 2014
Jerry Irvine talks about smart cyber security tactics for summer travel here.

Coffee Break: Jim Lagattuta – July 7, 2014
Learn more about Prescient and its CEO with this Business Ledger Q&A here.

How Developers Battle Security Bugs – June 27, 2014
Jerry Irvine talks about behind the scenes efforts to mitigate risks in our cyber world here.

Could Your Smart Home Be Hacked? – June 6, 2014
Get Jerry Irvine’s thoughts from U.S. News and World Report here.

Into the Breach – June 2, 2014
Jerry Irvine weighs in on the current cyber security climate and potential for government regulation here.

Internet Explorer flaw not yet patched by Microsoft – April 30, 2014
USA Today gets Jerry Irvine’s suggestions for working around the flaw here.

Does Heartbleed have the Power to take our energy? – April 27, 2014
The Morning Consult gets Jerry Irvine’s thoughts here.

Does the Healthcare Industry need to be more wary of Heartbleed? – April 27, 2014
Jerry Irvine discusses healthcare security with The Morning Consult here.

Federal Websites Avoid Hearbleed Risks – April 14, 2014
NextGov features some of Jerry Irvine’s thoughts here.

What’s the prognosis with Heartbleed? – April 11, 2014
Govt. Computer Technology offers Jerry Irvine’s advice for the long-term here.

Heartbleed Bug Brings Up Lots of Questions – April 11, 2014
Bill Moller talks with Jerry Irvine about Heartbleed here.

Are you safe from Heartbleed? – April 9, 2014
You’ve heard the rumors. Government Technology may offer answers here.

Is the end of Windows XP support going to lead to a major hacker attack? – April 8, 2014
Jerry Irvine talks Windows XP zombie apocalypse with Bloomberg here.

Is the Smart Home a Dumb Choice? – April 4, 2014
Akron Beacon Journal gets Jerry Irvines take on Smart Technology here.

Bill Moller Investigates the IoT on First Business News – April 1, 2014
Jerry Irvine, CIO of Prescient Solutions, explains how to protect your gadgets from hackers here.

Insights and Analysis on all things “Cyber” – March 28, 2014
Jerry Irvine’s profile featured in Homeland Security Today here.

Let the Buyer Beware with the Internet of Things – March 25, 2014
Jerry Irvine gives CIO.com warnings about the IoT here.

How consumers can prevent from becoming victim of hackers – March 19, 2014
Listen to Jerry Irvine on the WBBM-AM Noon Business Hour here.

Can data lakes solve cloud security challenges – March 18, 2014
CSO Online includes Jerry Irvine’s thoughts on the use of data lakes here.

If not secured, smart homes are just begging to be hacked – March 17, 2014
Jerry Irvine shares more about the Internet of Things with CSO here.

Should your information be swimming in the Data Lake? – February 28, 2014
Irvine details data lakes to the Enterprise Efficiency readers here.

First American Bank reports Chicago Taxi data breach – February 28, 2014
CSN Chicago interviews Jerry Irvine on taxi cab hacking here.

Blue Cross Parent Company initiates ethical hacking plan – February 25, 2014
Prescient reveals to Crain’s why some Chicago businesses self hack here.

Fierce CIO discovers the curveballs in Big Data Infrastructure – February 24, 2014
In Part 3 Jerry Irvine provides check points for Big Data Vendors here.

Contactual matters for Big Data in the Clouds – February 24, 2014
In Part 2 of 3 Jerry Irvine shares info on big data back-ups here.

Problems of infrastructure for Big Data Analytics – February 24, 2014
Fierce CIO gets Irvine’s view on big data search in Part 1 of 3 in a series.

Useful Tools for Small Businesses to Avoid Date Breach – January 17, 2014
Grand Rapids Business Journal Interviews Jerry Irvine to find useful tools for small businesses here.

Internet of Things Pokes Holes in IT Security – January 15, 2014
Government Technology News shares Jerry Irvine’s insights into the Internet of Things here.

Learn Ways to Protect Against Data Breach as shared with First Business – January 14, 2014
Jerry Irvine shares ways to protect yourself from a data breach here.

WBBM-AM Noon Business Hour Segment discusses Retail Cybercrimes – January 13, 2014 
Hear Jerry Irvine discuss security measures with the WBBM-AM crew here.

Security Measures You Can take to Avoid Being the Next Target – January 14, 2014
Watch NBC 5’s Regina Waldroup meet with Jerry Irvine to discuss the Target security breach here.

Corporate Secretary Identifies How CyberCrime Will Effect Boards in 2014 – January 8, 2014 
Jerry Irvine speaks to the viability of an organization after cyber crime here.

SC Magazine Discusses the Necessity for Cloud Security in this edition – January, 2014

Prescient’s Irvine and other CIOs share their thoughts on security in the cloud here.

What does the Internet of Things mean for IT Security in 2014? – January 9, 2014
Prescient’s CIO advises CSO-Online on several threats to watch here.

Will Cyber attacks increase in 2014? – January 9, 2014
The Daily Herald asks Jerry Irvine to share his insights here. 

Jerry Irvine featured in InformationWeek – December 23, 2013
Jerry Irvine talks about security challenges for BYOD and the cloud in 2014. Read the story here.

Jerry Irvine featured in FutureStructure – December 22, 2013
Prescient CIO Jerry Irvine discusses the security issues that go along with the Internet of Things. Read the story here.

Jerry Irvine featured in Insurance Journal – December 21, 2013
Jerry Irvine sheds insight into data security in the wake of the Target breach. Read the story here.

Jerry Irvine featured in the Baltimore Sun – December 20, 2013
Prescient CIO Jerry Irvine talks about the patience, cunning behind the Target data breach. Read the story here.

Jerry Irvine featured in the Chicago Tribune – December 20, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the story here.

Jerry Irvine featured on CRN.com – December 19, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the storyhere.

Jerry Irvine featured on WBBM-AM – December 19, 2013
Listen to Prescient CIO Jerry Irvine discuss the recent Target data breach. Advance to 2:14 to hear theinterview.

Jerry Irvine featured in Mobile Security Zone – December 16, 2013
Jerry Irvine provided insight on 2014 cloud security and BYOD trends and predictions. Read more here.

Jerry Irvine featured in The Communique – December 1, 2013

CIO Jerry Irvine discusses mobile device security for employees. Read the article here.

Jerry Irvine featured in Forbes – November 26, 2013
CIO Jerry Irvine discusses Cyber Monday security issues with Hollie Slade. Read the article here.

Jerry Irvine featured in The Enterprising CIO – November 8, 2013
In an interview with Minda Zetlin, Jerry Irvine provided insight on cloud security. Read more here.

Jerry Irvine featured in SC Magazine – November 1, 2013

CIO Jerry Irvine discusses mobile payment security with Stephen Lawton. Read the article here.

Jerry Irvine featured in Government Technology – October 30, 2013
Jerry Irvine discusses new cyber threats from hacking groups. Read the article here.

Jerry Irvine featured in Government Technology – October 29, 2013
Jerry offers tips and tricks to help agencies protect sensitive data. Read the article here.

Jerry Irvine featured on First Business – October 28, 2013
Jerry spoke with Bill Moller on the dangers of Ransomware. View the segment here.

Jerry Irvine featured in Forbes – October 22, 2013
In an interview with Scott Koegler, Jerry Irvine provided insight on security issues with Google Glass and wearable technologies. Read more here.

Jerry Irvine featured in the Wall Street Journal – October 21, 2013
Jerry Irvine discusses why individual hackers are no longer a threat and why we need to be worried about organized groups. Read the article here.

Jerry Irvine featured in Corp! Magazine – October 17, 2013
CIO, Jerry Irvine covers what, where and when to cloud. Read the article here.

Jerry Irvine featured on SmallBusinessComputing.com – October 10, 2013
Jerry Irvine shares his thoughts on how SMBs are/are not using the cloud for disaster recovery (DR). Read the article here.

Jerry Irvine featured in eHow Tech Podcast – October 1, 2013
Jerry Irvine discusses the iPhone’s Touch ID fingerprint reader security. Listen to the podcast here.

Jerry Irvine featured in FierceCIO – September 29, 2013
The ability to build and communicate a credible business case is obviously necessary to the CIO. Read the full article here.

Jerry Irvine featured in Government Product News – September 18, 2013
Jerry Irvine discusses top threats to local government’s information security. Read the interview here.

Jerry Irvine featured on CreditCards.com – September 17, 2013
The security of mobile swiping systems can vary. Inputting credit card information to a smartphone or tablet can present troubling security risks. View interview here.

Jerry Irvine featured in American City and County – September 17, 2013
In an interview with Michael Keating, Irvine gives insight on the necessity of data recovery after a disaster. Check out the article here.

Jerry Irvine featured on ThomasNet – September 17, 2013
Jerry Irvine talks about disaster recovery best practices for manufacturer. Read the story here.

Jerry Irvine featured on First Business News – September 12, 2013
In a TV interview, Jerry Irvine provided insight on the new iPhone fingerprint technology.

Jerry Irvine featured in IT Manager Daily – September 17, 2013
What are the hottest IT certifications today? Read the story here.

Jerry Irvine featured on Kiplinger – September 10, 2013
Simple steps to take to reduce your risk of becoming a victim of identity theft and financial fraud with Jerry Irvine. Article here.

Jerry Irvine featured in Security Magazine – September 1, 2013
Jerry Irvine the five top security questions about iPhone biometric authentication. Article here.

Jerry Irvine featured in eWeek – August 25, 2013

Irvine highlights the future of the Internet of Things, but also highlights the dangers. Read the full article here.

Jerry Irvine featured in InformationWeek – August 22, 2013

Irvine explains potential threats posed to government organizations by Google Glass. View his article here.

Jerry Irvine featured in Workforce Management – August 21, 2013
Jerry Irvine helps define the company’s role in tech support for contingent workers. Read the interview here.

Jerry Irvine featured in Baseline – August 16, 2013

Organizations are encountering new security risks as Google Glass goes mainstream because the device can be used to secretly capture confidential data. Read the full article here.

Jerry Irvine featured in Human Resource Executive Online – August 7, 2013
In an interview with Kecia Ball, Irvine gives insight on the growing gap in IT skills. Article here.

Jerry Irvine featured in The Chicago Tribune – August 4, 2013
Google Glass has been generating headlines, but what are the cybersecurity vulnerabilities? Irvine provides his expertise in a bylined article. Article here.

Anthony Pettenon featured in The Chicago Tribune – August 4, 2013
What’s it like to be a Google Glass Explorer? Anthony Pettenon provides a glimpse of his experience in a bylined article. Article here.

Jerry Irvine featured in SC Magazine – August 1, 2013
Jerry Irvine discusses the skills in demand for ERP system administrators. Read the full article here.

Prescient Solutions featured in Bankrate – July 18, 2013
Hackers are always on the hunt for personally identifiable information. Read Jerry Irvine’s tips for setting secure online passwords. Article here.

Jerry Irvine featured in The Wall Street Journal –  June 26, 2013
In an interview with Gregory Millman, Irvine explains why varying your passwords may save you from a cybersecurity threat. Article here.

Jerry Irvine featured in American City & County – June 25, 2013

Learn more about the top local government IT security trends for the second half of 2013. Article here.

Prescient Solutions featured in Chicago Sun-Times – June 14, 2013
Read more about how Prescient Solutions keeps Chicago businesses secure and why we are up for an American Technology Award. Article here.

Jerry Irvine featured in Fox Business – June 12, 2013
Traveling poses new opportunities for identity theft. CIO Jerry Irvine shared the unique threats to your personal data while traveling. Read the article here.

Jerry Irvine featured on CFO.com – June 03, 2013
This webcast features a distinguished panel of experts who will chart the proliferation in the use of business applications, and explain both the opportunities and risks of shedding the related management responsibilities to third parties. View webcast information here.

Jerry Irvine featured in SC magazine – June 1, 2013
In his opinion column, Irvine explains why securing mobile devices along is not enough. Read morehere.

Jerry Irvine included in Forbes Insights – June 2013
Forbes Insights conducted a survey with executives in order to gain their insight on mobile for business. Irvine offers his expertise here.

E.U.’s Broad Cyber Security Strategy Faces A Long Path To Approval – May 19, 2013
CIO Jerry Irvine commented on the EU’s new cybersecurity framework in Business Insurance. Read the article here.

Jerry Irvine featured on Fox Chicago – May 14, 2013
In an interview with Anna Davlantes, Jerry Irvine provided the dos and don’ts of protecting information online. Watch the video here.

Shedding Light on Bring Your Own Cloud – May 9, 2013
A plethora of unauthorized apps is creating havoc for IT departments everywhere. CIO Jerry Irvine offers ways to gain back control of cloud sprawl. Read more here.

Google’s Inactive Account Manager Heightens Enterprise Awareness for Securing Data – May 7, 2013
In an interview with TechRepublic, Jerry Irvine explained what companies need to know about Google’s latest feature. Read more here.

Jerry Irvine featured in USA Today – May 6, 2013
In an interview with Byron Acohido, Jerry Irvine provided insight on the planned hacking attack on banks and credit unions. Read more here.

Help Combat Intellectual Property Theft – May 2, 2013
The bring your own device movement is sweeping through corporations, increasing productivity and collaboration. But figuring out how to secure devices remains a top concern for HR departments. Jerry Irvine provides tips for preventing IP theft here.

Specialized IT Project Managers Are in Demand – May 1, 2013
In his ongoing column in SC Magazine, Jerry Irvine provided insight on the skills needed to become an IT project manager. Read more here.

The Security Certification Debate Continues – April 25, 2013
The value of security certifications for IT professionals has long been debated. Jerry Irvine shares his thoughts on why they still add value. Read more here.

Jerry Irvine featured on ABC 7 Chicago – April 23, 2013
In an interview with Ben Bradley from ABC, Jerry Irvine discussed the hacking of The Associated Press’ Twitter account. Watch the interview here.

Jerry Irvine featured on CFO webcast – April 22, 2013
In a webcast with CFO magazine, Jerry Irvine provided expertise on the protocols companies should be implementing to address shadow IT risks. Download the webcast here.

How Valuable Are Security Certifications Today? – April 1, 2013
In an article by  Lauren Gibbons Paul, Jerry Irvine provided his perspective on the value of certifications for IT professionals. Read more here.

Hackers Up the Ante for Small-Business Data Security – March 14, 2013
In an interview with Elaine Pofeldt, Jerry Irvine provided guidance on how small businessess can protect themselves from hackers. Read more here.

Why You Should Consider an IT Audit – March 7, 2013
In an interview with Sheryl Nance-Nash, Jerry Irvine explained that personally-identifiable information is becoming a huge target for hackers. Read more here.

Cloud Computing: Where Are We Now? – March 6, 2013
In an interview with Michael McDermott, Jerry Irvine provided expertise on how the cloud is impacting small businesses. Read more here.

Hot Security Skills of 2013 – March 3, 2013
In an interview with CSO Magazine, Jerry Irvine provided expertise on the skills needed to become a CSO. Read more here.

Fear Factor: Why Security Is Still the Cloud’s Biggest Hurdle – Feb. 25, 2013
In an interview with CRN, Jerry Irvine provided expertise on how organizations can protect their data while operating in the cloud. Read more here.

Threat of the Week: What the President’s Cyber Security Directive Means to You – Feb. 15, 2013
In an interview with Credit Union Times, Jerry Irvine offered his perspective on President Obama’s executive order on cybersecurity. Read more here.

Banks Fear Liability from Obama Cybersecurity Plan – Feb. 12, 2013
In an interview with Evan Weinberger, Jerry Irvine offered insight on how banks might be impacted by President Obama’s executive order on cybersecurity. Read more here.

Are You Minimizing Your Travel Risks – Feb. 1, 2013
In an interview with Global Traveler, Jerry Irvine provided expertise on how business travelers can keep their information safe while overseas. Read more here.

Jerry Irvine featured in SC Magazine – Feb. 1, 2013
In an ongoing SC Magazine column, the Prescient CIO explained why automation systems professionals are in demand. Read more here.

Jerry Irvine featured on NBCnews.com – Jan. 30, 2013
In an article by Sue Marquette Poremba, Jerry Irvine provided tips for protecting smartphones from malicious applications. Read more here.

How to Lock Down Your Android and Lock Out Malware – Jan. 30, 2013
In a TechNewsDaily article, Jerry Irvine offered insight on how to protect a mobile device from malicious applications. Read more here.

Three Tips for Keeping Your Personal Information Safe – Jan. 29, 2013
In a blog post featured on Stay Safe Online, Jerry Irvine offered insight on easy ways you can protect personal information online. Read more here.

IT’s Top Budget Busters – Jan. 22, 2013
In a bylined article on FierceCIO.com, Prescient CIO Jerry Irvine detailed why so many companies outspend their IT budgets. Read more here.

What’s on Your Smartphone? – Jan. 14, 2013
In an article by Robert McGarvey, Jerry Irvine explained why all is not lost if you’ve misplaced your mobile device. Read more here.

Jettisoning Java: Damned If You Do, Damned If You Don’t – Jan. 12, 2013
Our CIO Jerry Irvine provided guidance to businesses utilizing Java amid cybersecurity concerns to the platform. Read more here.

Three Biggest Myths About Business Continuity Planning – Jan. 11, 2013
Prescient’s blog post about disaster recovery and business continuity planning was featured by Disaster Recovery Journal. Read more here.

Jerry Irvine featured on First Business – Jan. 9, 2013
In a TV interview with Bill Moller, CIO Jerry Irvine provided insight on the strengths and weaknesses of antivirus solutions. Watch the interview here.

7 Deadly Sins of Cloud Computing – Jan. 2, 2013
Our CIO Jerry Irvine provided expertise on mistakes companies make when switching to cloud-based technology. Read more here. 

How to Protect Yourself While Using Shopping Apps – Dec. 31, 2012
In an article by Katie Gatto, Jerry Irvine explained why shopping on your smartphone can be hazardous to your personal information. Read more here.

How to Prepare Your VoIP System for Disaster – Dec. 17, 2012
In an interview with Cindy Waxer, Jerry Irvine shares best practices for utilizing a VoIP system to maintain business continuity. Read more here.

Top Five IT Budget Busters and How to Avoid Them – Dec. 13, 2012
In an interview with Robin Miller, Jerry Irvine provided guidance for organizations setting their IT budgets. Watch the interview here.

When In China, Don’t Leave Your Laptop Alone – Dec. 4, 2012
In an interview with Bob Violino from InfoWorld, Jerry Irvine explained the challenges of data protection while traveling overseas. Read more here.

Skills in Demand: System Engineers – Dec. 3, 2012
In an SC Magazine article, Jerry Irvine detailed the skills employers are looking for when hiring a system engineer. Read more here.

Prescient CIO featured in MarketWatch – Nov. 29, 2012
In an interview with MarketWatch’s Rex Crum, Jerry Irvine provided tips for protecting data while shopping on your smartphone. Read more here.

Why More SMBs Are Reaching the Virtualization Tipping Point – Nov. 27, 2012
Our CIO Jerry Irvine detailed the value of virtualization for businesses with physical servers. Read more here.

2013 Small Business Trends: Known Unknowns Ahead – Nov. 27, 2012
Jerry Irvine provided insight on IT hiring trends on Monster.com. Read more here.

Cyber Monday 2012 Sales Require Security Awareness – Nov. 26, 2012
In an interview with ABC7’s Leah Hope, CIO Jerry Irvine provided tips on how to keep your data safe while shopping online. Watch the interview here.

Jerry Irvine featured on ABC7 Chicago – Nov. 26, 2012
In an interview with Judy Hsu of ABC7, Jerry Irvine provided insight on how consumers can protect themselves while shopping online. Watch the full interview here.

Prescient CIO Foresees IT Challenges Ahead – Nov. 16, 2012
Jerry Irvine provided insight on the issues facing IT departments in Enterprise Efficiency. Read more here.

Five Steps to Prepare Employees, Business for Natural Disasters – Nov. 9, 2012
Jerry Irvine stressed the importance of developing a business continuity plan to properly prepare for business interruption in BenefitsPro. Read more here.

How to Become a Security Analyst – Nov. 5, 2012
In an article by Ian Palmer of Infosec Institute, CIO Jerry Irvine provided guidance on what IT companies look for when hiring a security analyst. Read more here.

Hurricane Sandy Tests Business Continuity, Disaster Recovery – Oct. 31, 2012
In an interview with SC Magazine, Prescient Solutions’ Jerry Irvine explained that business continuity plans are important differentiators in determining how quickly organizations recover from a disaster. Read more here.

The State Of ETL: Extract, Transform And Load Technology – Oct. 8, 2012
In a Data Informed article by Alan Earls, Jerry Irvine detailed how businesses of all sizes are using ETL technology. As Irvine explained, it’s not just for data warehousing. Read more here.

Jerry Irvine featured on First Business – Sept. 18, 2012
In an interview with Bill Moller, Irvine provided insight on the emerging threat that hackers pose to smartphones. Watch the full interview here.

Mobile CRM’s Tricky Back End – Sept. 11, 2012
In a CRM Buyer article, Jerry Irvine provided best practices for organizations integrating mobile CRM into their business. Read more here.

Patient Hackers Pose Growing Threat To Insurance Companies Large And Small – Sept. 4, 2012
In an article by Anthony O’Donnell, Jerry Irvine provided insight on advanced persistent threats. Read more here.

Jerry Irvine featured in Global Finance – Sept. 1, 2012
In an article by Paula Green, our CIO provided insight on the state of cyber risk. Read more here.

Prescient Solutions featured on Interest.com – Aug. 22, 2012
In an article by Rich Mintzer, Jerry Irvine provided insight on email scams and how to protect your identity online. Here.

The Growing Pains of BYOD – Aug. 20, 2012

In an article authored by our CIO, Jerry Irvine discussed the security challenges of implementing a BYOD policy. Read the full article here.

Finding New Infrastructure Solutions – Aug. 20, 2012
In an article in Homeland Security Today, Jerry Irvine provided insight on the latest trends in viruses and cybersecurity. Read the full article here.

Jerry Irvine featured on HP Input/Output – Aug. 8, 2012
In an article by Lisa Vaas, Irvine discussed the job market for cybersecurity professionals and what companies look for when hiring for InfoSec positions. Read more here.

Prescient Solutions featured on Tech Talk – Aug. 5, 2012
In an interview with Craig Peterson of Tech Talk radio, Jerry Irvine discussed the cybersecurity risks associated with the 2012 Summer Olympics and how hacking has changed over time. Listen to the full interview here.

IT Skills in Demand – Aug. 1, 2012
In ongoing SC Magazine column, Jerry Irvine provided insight on the high demand for business continuity and disaster recovery specialists. Read more here.

Jerry Irvine interviewed on NBC Chicago – July 9, 2012

In an interview with NBC Chicago, Irvine discussed the potential implications of the DNS Malware virus and provides best practices for avoiding a virus. Watch here.

Prescient Solutions featured in SC Magazine – July 2, 2012
In an article by Alan Earls, Jerry Irvine provided tips on how companies can improve their data protection and information security. Here.

Prescient Solutions featured on CNBC – May 29, 2012
In an article by CNBC reporter Mark Koba, Jerry Irvine shared his thoughts on the current state of the tech worker shortage. Article here.

Jerry Irvine featured on About.com – May 18, 2012
In an article written by our CIO, Irvine provided an overview of CISPA and covered all sides of the debate. Read more here.

Prescient Solutions featured on ABC – May 17, 2012
In an interview on WLS-TV, Jerry Irvine detailed that hacking groups view the NATO Summit in Chicago as a platform to gain publicity and notoriety. Watch here.

Irvine provides Insight on CISPA – May 17, 2012
In an interview with The Tech Guy, Jerry Irvine explained why he’s in favor of CISPA and feels it’s the best option available. Learn more about CISPA and read the full interview here.

Prescient CIO Featured in Crain’s Chicago Business – May 3, 2012
In an article by Crain’s Chicago reporter Danny Ecker, Irvine explained that everyone is at risk for attack during the NATO Summit. Article here.

Jerry Irvine featured in SC Magazine – May 1, 2012
CIO Jerry Irvine discussed IT skills currently in demand by organizations. Read his article here.

Prescient Solutions on WGN Radio – March 31, 2012
In an interview with WGN Radio’s Bill Moller, Jerry Irvine discussed cyber security and the hacking group Anonymous. Link not available.

Prescient CIO in SC Magazine – March 3, 2012
In an SC Magazine article by Jim Romero, Irvine gave his thoughts on the growing trend of hacktivism here.

Irvine Provides Insight to TechNewsWorld – Feb. 28, 2012
In an article titled “Are Security Vendors Living in Glass Houses?” Prescient CIO Jerry Irvine emphasized the importance of disclosing data breaches to avoid placing customers at risk. Read the TechNewsWorld article here.

Debate over Cyberspace Legislation – Feb. 15, 2012
In an AOL Government article discussing proposed cybersecurity legislation, Jerry Irvine advocated for more transparency among all organizations and cautioned that the bill might place an inordinate burden on the private sector. Learn more about the legislation and read Irvine’s comments here.

Prescient CIO Quoted in New York Times – Feb. 14, 2012

One year after hacking collective Anonymous penetrated the website of Combined Systems, reporter Nicole Perlroth sought guidance on how organizations can decrease the likelihood of an attack. Jerry Irvine advocated for companies allocating more financial resources to protecting their IT. View the full article here.

Irvine Featured Guest on FOX Chicago News – Feb. 13, 2012
Appearing on “Good Day Chicago” with Corey McPherrin and Anna Davlantes, Irvine provided tips to help online consumers protect themselves. Refraining from using email addresses as user ids and not allowing websites to save credit card information were among the points that Irvine outlined. Watch the segment here.

New York Times Article Features Irvine – Feb. 10, 2012
In an article by New York Times reporter Nicole Perlroth, Irvine analyzed an attack on the C.I.A. website by Anonymous and the potential of future occurrences. Read the full article here.

Hacks on VeriSign System Brings Concerns for Security Industry– Feb. 3, 2012
Two years following the incident, VeriSign, an infrastructure company, acknowledged that their system has been compromised by an attack in 2010. Irvine was quoted in the E-Commerce Times regarding the lack of confidence that users have in the security of their data online. View the article by reporter Erika Morphy here.

Irvine Discusses Cloud Technology in PC Today – Feb. 1, 2012
In an article titled “Cloud Critics”, Irvine offered his expertise for businesses contemplating the use of cloud technology and cautioned against putting their entire application system on cloud. Read the article and Irvine’s guidance here.

Interview on WGN Radio – Jan. 28, 2012
In honor of Data Privacy Day, an international celebration aimed at raising awareness about piracy and best practices, Irvine was interviewed on WGN Radio by reporter Bill Moller. Listen to the interview here.

Data Privacy Day Interview on WTMJ-AM – Jan. 28, 2012
Appearing on WTMJ-AM in Milwaukee with host Michelle Fiore, Irvine conversed about Data Privacy Day. No hyperlink of the interview is currently available.

Data Privacy Day Interview on First Business – Jan. 27, 2012
In advance of Data Privacy Day, Irvine was featured in an interview with Bill Moller. Watch the full episode here.

New York Times Features Irvine’s Recommendations for Online Consumers – Jan. 17, 2012
After a security breach at Zappos compromised their massive customer database, Irvine provided advice to the New York Times on how consumers can better protect themselves. View the full articlehere.

Irvine Delivers Expertise in New York Times Article – Dec. 25, 2011
Following a highly publicized attack by hackers, Irvine cautioned that all websites have some level of vulnerability in a New York Times article titled “Hackers Breach the Web Site of Stratfor Global Intelligence.” See the full article here.

IT Hiring Trends in CIO – Dec. 1, 2011
“Six Hot IT Jobs That Will Pay Well in 2012” included quotes from Irvine regarding recent software developments and an increase in IT jobs within the marketplace. The CIO article can be found here.

Irvine Featured in PC Today – Nov. 1, 2011
The Prescient Solutions CIO provided his recommendations for a computer security system and detailed the costs associated with incorporating the infrastructure. Read the entire PC Today article here.

Analysis of the IT Job Market in Computerworld – Oct. 5, 2011

In “IT Industry Shrinks as Employer in Past Decade”, Irvine provides perspective on the current state of hiring in the IT industry and the challenges of finding versatile candidates. Read the Computerworld article here.

Irvine Quoted in CRN Article – Sept. 22, 2011
In an article titled “Five Ways to Get a Piece of the Cloud Market”, Irvine advised on best practices for securing data while incorporating cloud technology. View the full CRN article by Jennifer Bosavagehere.

Cyber Security Interview on First Business – July 26, 2011
CIO Jerry Irvine, a member of the National Cyber Security Task Force, was a featured guest on an episode of First Business with Bill Moller. Irvine provided his expertise on cyber security. Watch the full episode here.

The Payoff – Feb 2017 – Leader’s Edge Magazine

In May 2016, a hacker seized control of computer systems at Kansas Heart Hospital in Wichita. The hospital could not regain control unless it paid the hacker a ransom—an amount reported to be “small.”

Do Data Centers Have A Future In A Multi-Cloud World? – January 3, 2017 – Forbes

As more organizations migrate storage, processing and data to different cloud environments and service providers, on-premises data centers just aren’t what they used to be. They’re still there, but they’ve lost a few inches in height.

Travelers, beware! Hacking lurks in plugs and ports – December 20, 2016 – USA Today

We’re all guilty of bringing too many gadgets along when we travel. But using local Wi-Fi and public outlets can put you at risk for cyber threats. Here’s how to keep your personal information private while traveling.

EMV migration delay doesn’t let gas stations completely off the hook – December 8, 2016 – CSO

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t mean that gas stations can now relax their EMV upgrade plans.

Chicago Theater customer data may be compromised by data breach – November 22, 2016 – WGN TV

A massive data breach was reported Tuesday by the owner of the historic Chicago Theater.

“Hacker Lab” Event Shows How Cyber Criminals Attack Homes – November 16, 2016 – Claims Journal

The October 13 workshop in New York City mounted a remote cyber-attack on an Internet-connected model home inside the American Modern Insurance Group claims training facility in Ohio. The event demonstrated in real time how hackers choose their targets, enter a system, and the harm they can do once they infiltrate a home.

Robots present a cyber risk – November 9, 2016 – CSO

Experts say the growing use of robots by companies such as manufacturers, retailers, healthcare institutions and other businesses can present a number of cyber risks.

How Your IoT Devices Turned Into a Zombie BotNet – October 24, 2016 – GearBrain

The flat-lining of many famous websites on Friday started right from your home. Maybe not your home—but someone’s. The Distributed Denial of Service attack (also known as a DDoS attack) started at about 7 am ET Friday, in essence turning off the valve to many web sites.

Why Seemingly Infallible File-Sharing Apps Go Dark, And What Is Being Done To Stop It – October 19, 2016 – Forbes

We’ve taken for granted the ability of file-sharing apps to pull up a presentation minutes before an important sales pitch or panel session. But what if, for some reason, the technology failed to work?

Top Tips for Protecting Your Devices From Cyberattacks – October 19, 2016 – Credit.com

Here are a hacker’s top tips for protecting your devices from cyberattacks.

7 ways to keep your smart home from being hacked – October 17, 2016 – MarketWatch

In the modern home, everything from TVs and refrigerators to baby monitors and lightbulbs can now be connected — and hacked.

Chip & Pin Technology More Secure – October 3, 2016 – WGN TV

Jerry Irvine discusses chip/pin technology.

From faces to fingerprints, keeping biometric information safe is a growing concern – August 24, 2016 – WGN TV

Biometrics are a security resources that are getting more wifely used when it comes to shopping, banking and traveling. It’s all good, unless it somehow gets into the wrong hands. It’s all biometric information and once it’s gone or stolen, how do you get it back? The answer: You can’t.

Going On Vacation? How To Protect Yourself From Online Threats – August 22, 2016 – Forbes

Connecting to a corporate network while on vacation can be dangerous — even more so than connecting while on a business trip. Vacationing employees may not be focusing on security when they’re checking email or accessing office documents. Procedures that may be top-of-mind in the workplace can take aback seat.

Cyber extortion risks increase as threats grow more sophisticated – August 7, 2016 – Business Insurance

Cyber extortion is a growing threat across industries, and particularly health care organizations, as criminals cast their nets wider using increasingly sophisticated malicious code.

6 Myths About Credit Cards — Busted – August 4, 2016 – GOBankingRates

Many cardholders hold false beliefs about how these pieces of plastic work. Here are six credit card myths, debunked.

Experts: SentinelOne Ransomware Guarantee No Replacement for Cyberinsurance – August 1, 2016 – CSO Magazine

Earlier this week, SentinelOne announced that it will reimburse customers for up to $1 million if they are hit by a ransomware attack, but some experts say that this is a marketing gimmick and no replacement for a solid cyberinsurance policy.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – PCWorld

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – CIO Magazine

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

Keeping Your Data Safe During Summer Travel – June 27, 2016 – FOX 32

Jerry Irvine discusses keeping your data safe during summer travel.

5 Tips For Staying Cyber-Secure On Your Summer Vacation – June 20, 2016 – InformationWeek Dark Reading

Summer is officially here, and with that comes vacation season. But before you go, make sure you’re following these simple steps to stay cyber-secure while you soak up the sun:

Staying Safe on the Road: Infosec for Smart Travelers – May 31, 2016 – Secure Thoughts

It is a war for your data when you travel. The irony is that many, many pages are filled with advice on how to avoid pickpockets in Rome, muggers in Manhattan, and crooked taxi drivers in Rio.  But bad as those threats to your safety and wealth may be, you have a lot more exposure to real – and huge – risks that arise with theft of your information, your identity, your banking specifics.

Mobile devices: A better route to ID security – May 31, 2016 – GCN

In the federal government, Common Access Cards and personal identity verification cards for employees and contractors incorporate biometrics and give agencies a better foundation for security and ID management than many private-sector organizations enjoy. But that wasn’t always the case.

Cybersecurity for Small Businesses: You’re Never Too Small to be Safe – May 23, 2016 – NCR Silver

You would never leave your cash register open to thieves. But are you inadvertently leaving your corporate data and your employees’ personal information open to hackers?

SDN – A Step Forward or Backward for Infrastructure Security? – May 23, 2016 (Page 31-32) – Enterprise Networking

Software-defined networking (SDN) segments the major functions of networking into the control layer and transfers all networking functionality to a control host(s), leaving only packet forwarding functions at the switch level.

Ransomware attacks prompt warnings to House members – May 11, 2016 – SC Magazine

Members of the US House of Representatives and staffers received warnings that the House network has received a rise in attempted ransomware attacks.

Digital Vulnerability: Can hackers turn your vehicle into a remote control car? – May 6, 2016 – WGN TV

It can happen. Hackers– the criminal kind — can take over your car and do anything remotely that you as the owner can do electronically.

Digital Vulnerability: Cyber security expert on preventing your social media from being hacked – May 6, 2016 – WGN TV

In today’s world of technology and social media, the security of our personal information is a huge concern.

Digital Vulnerability: How safe are you on social media? – May 5, 2016 – WGN TV

While millions, even billions, are connecting on social media worldwide, what are the pictures, the captions, the details of your page really telling about you. Could it land you in trouble or even put you in danger?

Protecting Data Wherever it Lives – May 5, 2016 – GCN

Data encryption addresses four major areas: data in motion, data stored on user devices, data stored on servers and data that is currently being used.

Stolen Passwords – May 5, 2016 – FOX 32

One of the biggest stashes of stolen e-mail passwords ever and they are all up for grabs to hackers worldwide. over 272 million stolen google yahoo! and microsoft e-mail addresses and passwords are being traded in russia’s criminal underworld. and that means it may be time for you to update your password.

Digital Vulnerability: The Dangers of Webcams – May 3, 2016 – WGN TV

This installment focuses on webcams. Could someone be watching and you’d never know it? The answer? You bet they can.Anywhere you find those tiny little lenses, someone is capable of recording, maybe even streaming video and sound of you.

Digital Vulnerability: How safe is the Wi-Fi you’re using? – May 2, 2016 – WGN TV

This is a look at what you might be giving away when you simply tap into public Wi-Fi.

Password Protection – April 28, 2016 – Independent Banker

Software can secure and manage employees’ login credentials.

Hackers Branching out to Law Firms – April 5, 2016 – Business Insurance

Hackers are moving away from a focus on obtaining personally identifiable information and more towards “soft” targets including law firms.

Health Care: Cyberattacks Spook Device Makers – April 3, 2016 – San Fernando Valley Business Journal

Cyberattack nurses security fears of device makers.

Should CIOs worry about the Internet of Hackable Things? – February 16, 2016 – CIO from IDG

From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?

Internet of hackable things? Why IoT devices need better security –February 8, 2016 – The Enterprisers Project

The Internet of Things is amazingly powerful and useful — but not always safe to use, and most organizations with IoT implementations need to do a better job of keeping them secure.

The Three Largest Cyber Security Risks of the Decade Converge: Cloud Computing, BYOD, and IoT – Enterprise Networking

Weak Authentication: Agencies Slow to Fix Security Gaps – GovTech Works

The dark side of layered security – November 13, 2015 – CSO from IDG

Layered security is currently considered a best practice for enterprises, but sometimes these layers can have unintended consequences. Our CIO, Jerry Irvine, explains in this CSO Online article.

Weak Authentication: Agencies Slow to Fix Security Gaps – November 3, 2015 – GovTech Works
Two-factor or “strong” authentication requires users to provide at least two means of identification to access a system. Learn more.

Jerry Irvine: How to protect yourself online – October 14, 2015 – FOX 32
The month of October is Cybersecurity Awareness Month, making it the perfect time to take a step back to make sure you are protecting yourself both personally and professionally.

Appetites for more: Government actions – October 1, 2015 – SC Magazine
Cybersecurity is a technical challenge. But it also usually has a legal and regulatory aspect as well.Read more.

Chip-pin credit card 101 – October 1, 2015 – WGN TV
Starting today, major credit card companies must have rolled out the new chip-pin credit cards and stores should have the technology to read those cards. Our CIO, Jerry Irvine, has a quick lesson on how it all works.

Security experts mostly critical of proposed threat intelligence sharing bill – September 10, 2015 – CSO from IDG
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA.

EMV transition will still leave security gaps – September 8, 2015 – CSO from IDG
This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments.

Cybersecurity Professionals: The Government Wants You – July 20, 2015 – IEEE USA

Federal, state and local government agencies needs tens of thousands of cybersecurity employees just to fill existing job slots.

Data explosion offers challenges, opportunities to security pros – July 17, 2015 – CSO from IDG
Big Data analytics helps companies process all this information, prioritize the most significant threats, and weed out random noise and false alerts.

NYSE trading halt an insurance coverage wake-up call – July 14, 2015 – Business Insurance

Last week’s disruption of the New York Stock Exchange because of an apparent computer glitch may not have had a dramatic impact on the markets, but it should serve as a reminder to companies.

Encryption: What Does It Protect, What Are The Risks … And Is It Enough? – July 13, 2015 – HS Today

CIO Jerry Irvine discusses if today’s encryption technology really provides the level of confidentiality required in this totally Internet connected world.

Computer glitches expose vulnerability of critical infrastructure – July 10, 2015 – Security InfoWatch
Operations at the New York Stock Exchange, United Airlines and Wall Street Journal were severely impacted by what officials say are unrelated technical glitches in their respective computer systems.

Summer Travel Scam Targets Your Points and Miles – July 9, 2015 – CIO Magazine
How sure are you that the airlines miles and hotel rewards points you’ve been hoarding for years will be there when you go to redeem them.

Cyber Expert: Potential for Insured Losses in Technical Glitches That Hit NYSE, Wall Street Journal and United Airlines – July 8, 2015 – A.M. Best
Technical problems hit the New York Stock Exchange, United Airlines and the Wall Street Journal all on July 8, but one cyber security expert said the glitches so far appear to be separate incidents.

NYSE, United Airlines Shutdowns Spark Paranoia – July 8, 2015 – InformationWeek
United Airlines and the New York Stock Exchange both experienced massive outages this morning. The causes are slowly coming to light.

New Cybersecurity Council backs info sharing legislation – July 7, 2015 – Federal Times
The U.S. Chamber of Commerce announced its new Cybersecurity Leadership Council bringing together businesses interested in promoting best practices across the private and public sector.

Who’s Winning the Mobile Payments War? – June 29, 2015 – Network World
Mobile payments haven’t taken off. Yet. Read more.

Mobile Security: The Coming Battle of Hardware vs. Software – June 18, 2015 – CSO from IDG
According to security experts, there are several paths forward to mobile payments, each with its own security implications.

The OPM Hackers Have Your Data — Now What? – June 5, 2015 – Federal News RadioFederal employees who learn their data was stolen in the recent, record hack need to take several stepsquickly to mitigate their risks.

Massive Data Breach Puts Spotlight on Shared IT Services – June 5, 2015 – Government Executive
A breach that impacted records for 4 million federal employees has raised questions about the future of shared services. Learn more here.

Top In-Demand Skills for Cloud Security – May 15, 2015 – Cyber CodersThe demand for cloud security gurus continues to grow. Click here for the must-have skills.

Don’t Assume You’re Too Small to Attract Cybercrime – April 30, 2015
You don’t need to be a multi-million dollar business to be vulnerable to a cyber attack; many small- and medium-size businesses represent an easy target to would-be criminals. Read more here.

Boards Are on High Alert Over Security Threats – April 27, 2015
Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company’s security posture and steer the conversation toward managing business risk. Read more here.

Implantable Devices: Medical Devices Open to Cyber Threats – April 8, 2015
The threat of hacking implantable defibrillators and other devices is already growing. Read more here.

Report: Breach Exposed Obama Records – April 7, 2015
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president’s schedule. Learn more.

Tech Pros Need Business Skills, Too – March 24, 2015 
Check out the latest IT job ads and you’re more likely than ever to find employers asking for candidates with a strong understanding of business operations in addition IT skills. Read more about those must have skills here.

Agencies Navigate the Identity-Based Security Ecosystem – March 6, 2015
Identity systems – and the electronic formats for managing them – have become the top priority for organizations looking to safeguard the government data attackers now target.  Learn more here.

Feds Warn Computer Users of Ransomware – Feb. 23, 2015
The FBI has issued warning about a growing type of malicious Internet software that could take your computer hostage, along with all the data stored on it.  Learn more here.

What NFV Vendors are Currently on the Market? – Feb. 18, 2015
Many data centers are on the path to NFV. How are the NFV standards and vendor offerings guiding — or challenging — implementation? Get the latest insights.

Omaha’s Scoular Co. Loses $17 Million After Spearphishing Attack – Feb. 13, 2015
Prescient CIO Jerry Irvine offers advice to help organizations guard against spearphishing.

Microsoft Packing More Patches into Fewer Bulletins – Feb. 12, 2015
Microsoft is packing more common vulnerability exposures into its critical bulletins. Learn more here.

Decoding Tech Jargon – Winter 2015 
Prescient CIO Jerry Irvine offers up this handy guide to nine words and phrases that will help your organization make smarter cybersecurity decisions.  Read the full story on page 24.

Prescient Solutions Nets Award in ADP’s “Beyond the Startup” Contest – Jan. 20, 2015
Prescient Solutions won second place in ADP’s annual “Beyond the Startup” contest. Read more here.

Why Police Need to Hack into CCTV Systems in Paris and Elsewhere – Jan. 12, 2015
What good are the millions of surveillance cameras populating private and public property worldwide, if emergency responders can’t immediately obtain real-time footage?

Building a Better Security Budget – December 26, 2014
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization. Read more here.

Hack the Herald Angels Sing – December 8, 2014
What’s behind the recent hack at bebe?  Find out here.

What the Internet of Things Means for Your Business – December 3, 2014
Learn more about what small and mid-sized businesses need to know with these insights.

New Credit Card Security Rules Squelch Retailers’ Holiday Spirit – December 2, 2014
Retailers have one more thing to worry about during the year-end sales push.

Cyber Monday Scams – December 1, 2014
Buyer beware during the holiday season. Watch this First Business report to learn about the latest shopping scams.

Watch Out for These Three Holiday Shopping Scams – November 26, 2014
Whether you shop online or at the mall, look out for these three scams.

Five Reasons IT is Scared of Mobile Security – November 19, 2014
Despite the uptick in hacks, a recent study shows corporate IT isn’t investing enough in mobile security. Read why not here.

Does More Technology Equal a Safer Home? – November 19, 2014
With the influx of home automation technology comes a whole new breed of criminal for homeowners to guard against.  Find out how to defend your domain here.

27 Data Security Experts Reveal the #1 Information Security Issue Most Companies Face with Cloud Computing & Storage – November 12, 2014
Just like traditional storage and data sharing methods, cloud computing comes with its own set of data security issues. Read here for insight from the pros on the top issues.

Why Trendsetting Companies Change Course on Cloud Security – November 12, 2014
More small and mid-sized businesses are migrating to the cloud.  Find out why.

Experts: Take Stolen Email Addresses Very Seriously – November, 12, 2014

Prescient talked to Consumers Digest about the potential fallout from stolen email addresses and how to protect your accounts.  Read more here.

Changing the Security Mindset – October 29, 2014
As cyber attacks increase in number and complexity, financial services firms need to get more proactive in their security measures.  Read more here.

Business Phone Hacks – October 21, 2014
It’s easier than you think for hackers to get into your phone, and once they’re there it becomes a gateway to all kinds of private information.  View the First Business segment here.

Don’t Let the Machines Takeover: The 5 Basics of Smart Home Security — Oct. 10, 2014
Make your smart home even smarter with these security tips. Read more here.

Home Depot, Apple Cyber Attacks Highlight Variety of Methods Used by Hackers – September 14, 2014
The common denominator in both these cases is that hackers attacked the weakest link, according to Prescient CIO Jerry Irvine. Read more here.

Employers’ Wearable Device Policies Should Control and Restrict Use – September 14, 2014
A wearable device policy is a must for any company. Read what you should include in yours here.

What Does the Alleged iCloud Attack Mean for Federal Agencies? – September 2, 2014
The iCloud hack highlights concerns with federal employees accessing sensitive information on personal devices. Find out how agencies can take a smarter approach to security here.

The War Without End – September 2, 2014
Retailers face an impossible challenge when it comes to Internet security. Read more here.

First Business Looks at the JPMorgan Hack – August 29, 2014
Get insight into the hack and learn how to create a smarter password. (advance to 7:31).

Unsecured Smart Home Systems Leave Homeowners, Enterprises Vulnerable – August 26, 2014
Unsecured home security and automation systems could also serve as backdoor to hackers seeking access to a greater prize — corporate data on your smartphone.  Learn how to minimize your risks here.

Internet of Things (IoT) Poses Challenges for DevOps and Security – August 25, 2014
The emergence of IoT is driving the need for a mindset change.  Here’s what you need to know.

After Jewel, UPS, How do Consumers Stay Safe from Data Hacks? – August 22, 2014
The hacks keep coming and consumers need to get serious about their personal cyber security.  Read Jerry Irvine’s advice here.

Jewel-Osco Customers’ Credit Card Data May Have Been Compromised – August 16, 2014
Jerry Irvine shares insight with the Chicago Sun Times into the Supervalu hack and its impact on Chicagoland customers.

CISA Puts Congress in a Tough Spot – August 10, 2014
Can the Cyber Security Information Sharing Act be an effective tool against hackers and other cyber criminals? Get insight here.

1.2 Billion Passwords Compromised – Now What? – August 8, 2014
Prescient CIO Jerry Irvine has security advice in the wake of the largest hack in history.  Get it here.

Dos and Don’ts for Feds on Vacation – August 1, 2014
Prescient offers tips for federal government employees who plan to hit the road this summer.  Check them out here.

How Safe is Safe Enough? – August, 1, 2014
Small accounting firms face big cybersecurity challenges.  Read Prescient’s advice on how to minimize the risks here.

Summer Travel Cyber Security Tips For Government Employees – July 23, 2014
Vacationing as a government employee has its own set of cybersecurity concerns.  Read what to watch for and how to lessen the risks here.

Into the Breach: Midstate Experts Say Data Breaches are Inevitable – July 20, 2014
Can information sharing help companies do a more effective job at cybersecurity? Read more about this and other strategies here.

Agencies Inch Toward Solutions on BYOD – July 18, 2014
Jerry Irvine offers insight into the increasingly complex world of BYOD security for government agencies.  Read the Government Technology story here.

Cyberattacks Focus Employers on Security Certifications – July 9, 2014
What are all of these certifications and which make the most sense for you? Read more here.

Beef Up Your Security and Avoid Being a Victim on Vacation This Summer – July 8, 2014
Jerry Irvine talks about smart cyber security tactics for summer travel here.

Coffee Break: Jim Lagattuta – July 7, 2014
Learn more about Prescient and its CEO with this Business Ledger Q&A here.

How Developers Battle Security Bugs – June 27, 2014
Jerry Irvine talks about behind the scenes efforts to mitigate risks in our cyber world here.

Could Your Smart Home Be Hacked? – June 6, 2014
Get Jerry Irvine’s thoughts from U.S. News and World Report here.

Into the Breach – June 2, 2014
Jerry Irvine weighs in on the current cyber security climate and potential for government regulation here.

Internet Explorer flaw not yet patched by Microsoft – April 30, 2014
USA Today gets Jerry Irvine’s suggestions for working around the flaw here.

Does Heartbleed have the Power to take our energy? – April 27, 2014
The Morning Consult gets Jerry Irvine’s thoughts here.

Does the Healthcare Industry need to be more wary of Heartbleed? – April 27, 2014
Jerry Irvine discusses healthcare security with The Morning Consult here.

Federal Websites Avoid Hearbleed Risks – April 14, 2014
NextGov features some of Jerry Irvine’s thoughts here.

What’s the prognosis with Heartbleed? – April 11, 2014
Govt. Computer Technology offers Jerry Irvine’s advice for the long-term here.

Heartbleed Bug Brings Up Lots of Questions – April 11, 2014
Bill Moller talks with Jerry Irvine about Heartbleed here.

Are you safe from Heartbleed? – April 9, 2014
You’ve heard the rumors. Government Technology may offer answers here.

Is the end of Windows XP support going to lead to a major hacker attack? – April 8, 2014
Jerry Irvine talks Windows XP zombie apocalypse with Bloomberg here.

Is the Smart Home a Dumb Choice? – April 4, 2014
Akron Beacon Journal gets Jerry Irvines take on Smart Technology here.

Bill Moller Investigates the IoT on First Business News – April 1, 2014
Jerry Irvine, CIO of Prescient Solutions, explains how to protect your gadgets from hackers.

Insights and Analysis on all things “Cyber” – March 28, 2014
Jerry Irvine’s profile featured in Homeland Security Today here.

Let the Buyer Beware with the Internet of Things – March 25, 2014
Jerry Irvine gives CIO.com warnings about the IoT here.

How consumers can prevent from becoming victim of hackers – March 19, 2014
Listen to Jerry Irvine on the WBBM-AM Noon Business Hour here.

Can data lakes solve cloud security challenges – March 18, 2014
CSO Online includes Jerry Irvine’s thoughts on the use of data lakes here.

If not secured, smart homes are just begging to be hacked – March 17, 2014
Jerry Irvine shares more about the Internet of Things with CSO here.

Should your information be swimming in the Data Lake? – February 28, 2014
Irvine details data lakes to the Enterprise Efficiency readers here.

First American Bank reports Chicago Taxi data breach – February 28, 2014
CSN Chicago interviews Jerry Irvine on taxi cab hacking here.

Blue Cross Parent Company initiates ethical hacking plan – February 25, 2014
Prescient reveals to Crain’s why some Chicago businesses self hack here.

Fierce CIO discovers the curveballs in Big Data Infrastructure – February 24, 2014
In Part 3 Jerry Irvine provides check points for Big Data Vendors here.

Contactual matters for Big Data in the Clouds – February 24, 2014
In Part 2 of 3 Jerry Irvine shares info on big data back-ups here.

Problems of infrastructure for Big Data Analytics – February 24, 2014
Fierce CIO gets Irvine’s view on big data search in Part 1 of 3 in a series.

Useful Tools for Small Businesses to Avoid Date Breach – January 17, 2014
Grand Rapids Business Journal Interviews Jerry Irvine to find useful tools for small businesses here.

Internet of Things Pokes Holes in IT Security – January 15, 2014
Government Technology News shares Jerry Irvine’s insights into the Internet of Things here.

Learn Ways to Protect Against Data Breach as shared with First Business – January 14, 2014
Jerry Irvine shares ways to protect yourself from a data breach here.

WBBM-AM Noon Business Hour Segment discusses Retail Cybercrimes – January 13, 2014 
Hear Jerry Irvine discuss security measures with the WBBM-AM crew here.

Security Measures You Can take to Avoid Being the Next Target – January 14, 2014
Watch NBC 5’s Regina Waldroup meet with Jerry Irvine to discuss the Target security breach here.

Corporate Secretary Identifies How CyberCrime Will Effect Boards in 2014 – January 8, 2014 
Jerry Irvine speaks to the viability of an organization after cyber crime here.

SC Magazine Discusses the Necessity for Cloud Security in this edition – January, 2014

Prescient’s Irvine and other CIOs share their thoughts on security in the cloud here.

What does the Internet of Things mean for IT Security in 2014? – January 9, 2014
Prescient’s CIO advises CSO-Online on several threats to watch here.

Will Cyber attacks increase in 2014? – January 9, 2014
The Daily Herald asks Jerry Irvine to share his insights here. 

Jerry Irvine featured in InformationWeek – December 23, 2013
Jerry Irvine talks about security challenges for BYOD and the cloud in 2014. Read the story here.

Jerry Irvine featured in FutureStructure – December 22, 2013
Prescient CIO Jerry Irvine discusses the security issues that go along with the Internet of Things. Read the story here.

Jerry Irvine featured in Insurance Journal – December 21, 2013
Jerry Irvine sheds insight into data security in the wake of the Target breach. Read the story here.

Jerry Irvine featured in the Baltimore Sun – December 20, 2013
Prescient CIO Jerry Irvine talks about the patience, cunning behind the Target data breach. Read the story here.

Jerry Irvine featured in the Chicago Tribune – December 20, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the story here.

Jerry Irvine featured on CRN.com – December 19, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the storyhere.

Jerry Irvine featured on WBBM-AM – December 19, 2013
Listen to Prescient CIO Jerry Irvine discuss the recent Target data breach. Advance to 2:14 to hear theinterview.

Jerry Irvine featured in Mobile Security Zone – December 16, 2013
Jerry Irvine provided insight on 2014 cloud security and BYOD trends and predictions. Read more here.

Jerry Irvine featured in The Communique – December 1, 2013

CIO Jerry Irvine discusses mobile device security for employees. Read the article here.

Jerry Irvine featured in Forbes – November 26, 2013
CIO Jerry Irvine discusses Cyber Monday security issues with Hollie Slade. Read the article here.

Jerry Irvine featured in The Enterprising CIO – November 8, 2013
In an interview with Minda Zetlin, Jerry Irvine provided insight on cloud security. Read more here.

Jerry Irvine featured in SC Magazine – November 1, 2013

CIO Jerry Irvine discusses mobile payment security with Stephen Lawton. Read the article here.

Jerry Irvine featured in Government Technology – October 30, 2013
Jerry Irvine discusses new cyber threats from hacking groups. Read the article here.

Jerry Irvine featured in Government Technology – October 29, 2013
Jerry offers tips and tricks to help agencies protect sensitive data. Read the article here.

Jerry Irvine featured on First Business – October 28, 2013
Jerry spoke with Bill Moller on the dangers of Ransomware. View the segment here.

Jerry Irvine featured in Forbes – October 22, 2013
In an interview with Scott Koegler, Jerry Irvine provided insight on security issues with Google Glass and wearable technologies. Read more here.

Jerry Irvine featured in the Wall Street Journal – October 21, 2013
Jerry Irvine discusses why individual hackers are no longer a threat and why we need to be worried about organized groups. Read the article here.

Jerry Irvine featured in Corp! Magazine – October 17, 2013
CIO, Jerry Irvine covers what, where and when to cloud. Read the article here.

Jerry Irvine featured on SmallBusinessComputing.com – October 10, 2013
Jerry Irvine shares his thoughts on how SMBs are/are not using the cloud for disaster recovery (DR). Read the article here.

Jerry Irvine featured in eHow Tech Podcast – October 1, 2013
Jerry Irvine discusses the iPhone’s Touch ID fingerprint reader security. Listen to the podcast here.

Jerry Irvine featured in FierceCIO – September 29, 2013
The ability to build and communicate a credible business case is obviously necessary to the CIO. Read the full article here.

Jerry Irvine featured in Government Product News – September 18, 2013
Jerry Irvine discusses top threats to local government’s information security. Read the interview here.

Jerry Irvine featured on CreditCards.com – September 17, 2013
The security of mobile swiping systems can vary. Inputting credit card information to a smartphone or tablet can present troubling security risks. View interview here.

Jerry Irvine featured in American City and County – September 17, 2013
In an interview with Michael Keating, Irvine gives insight on the necessity of data recovery after a disaster. Check out the article here.

Jerry Irvine featured on ThomasNet – September 17, 2013
Jerry Irvine talks about disaster recovery best practices for manufacturer. Read the story here.

Jerry Irvine featured on First Business News – September 12, 2013
In a TV interview, Jerry Irvine provided insight on the new iPhone fingerprint technology.

Jerry Irvine featured in IT Manager Daily – September 17, 2013
What are the hottest IT certifications today? Read the story here.

Jerry Irvine featured on Kiplinger – September 10, 2013
Simple steps to take to reduce your risk of becoming a victim of identity theft and financial fraud with Jerry Irvine. Article here.

Jerry Irvine featured in Security Magazine – September 1, 2013
Jerry Irvine the five top security questions about iPhone biometric authentication. Article here.

Jerry Irvine featured in eWeek – August 25, 2013

Irvine highlights the future of the Internet of Things, but also highlights the dangers. Read the full article here.

Jerry Irvine featured in InformationWeek – August 22, 2013

Irvine explains potential threats posed to government organizations by Google Glass. View his article here.

Jerry Irvine featured in Workforce Management – August 21, 2013
Jerry Irvine helps define the company’s role in tech support for contingent workers. Read the interview here.

Jerry Irvine featured in Baseline – August 16, 2013

Organizations are encountering new security risks as Google Glass goes mainstream because the device can be used to secretly capture confidential data. Read the full article here.

Jerry Irvine featured in Human Resource Executive Online – August 7, 2013
In an interview with Kecia Ball, Irvine gives insight on the growing gap in IT skills. Article here.

Jerry Irvine featured in The Chicago Tribune – August 4, 2013
Google Glass has been generating headlines, but what are the cybersecurity vulnerabilities? Irvine provides his expertise in a bylined article. Article here.

Anthony Pettenon featured in The Chicago Tribune – August 4, 2013
What’s it like to be a Google Glass Explorer? Anthony Pettenon provides a glimpse of his experience in a bylined article. Article here.

Jerry Irvine featured in SC Magazine – August 1, 2013
Jerry Irvine discusses the skills in demand for ERP system administrators. Read the full article here.

Prescient Solutions featured in Bankrate – July 18, 2013
Hackers are always on the hunt for personally identifiable information. Read Jerry Irvine’s tips for setting secure online passwords. Article here.

Jerry Irvine featured in The Wall Street Journal –  June 26, 2013
In an interview with Gregory Millman, Irvine explains why varying your passwords may save you from a cybersecurity threat. Article here.

Jerry Irvine featured in American City & County – June 25, 2013

Learn more about the top local government IT security trends for the second half of 2013. Article here.

Prescient Solutions featured in Chicago Sun-Times – June 14, 2013
Read more about how Prescient Solutions keeps Chicago businesses secure and why we are up for an American Technology Award. Article here.

Jerry Irvine featured in Fox Business – June 12, 2013
Traveling poses new opportunities for identity theft. CIO Jerry Irvine shared the unique threats to your personal data while traveling. Read the article here.

Jerry Irvine featured on CFO.com – June 03, 2013
This webcast features a distinguished panel of experts who will chart the proliferation in the use of business applications, and explain both the opportunities and risks of shedding the related management responsibilities to third parties. View webcast information here.

Jerry Irvine featured in SC magazine – June 1, 2013
In his opinion column, Irvine explains why securing mobile devices along is not enough. Read morehere.

Jerry Irvine included in Forbes Insights – June 2013
Forbes Insights conducted a survey with executives in order to gain their insight on mobile for business. Irvine offers his expertise here.

E.U.’s Broad Cyber Security Strategy Faces A Long Path To Approval – May 19, 2013
CIO Jerry Irvine commented on the EU’s new cybersecurity framework in Business Insurance. Read the article here.

Jerry Irvine featured on Fox Chicago – May 14, 2013
In an interview with Anna Davlantes, Jerry Irvine provided the dos and don’ts of protecting information online. Watch the video here.

Shedding Light on Bring Your Own Cloud – May 9, 2013
A plethora of unauthorized apps is creating havoc for IT departments everywhere. CIO Jerry Irvine offers ways to gain back control of cloud sprawl. Read more here.

Google’s Inactive Account Manager Heightens Enterprise Awareness for Securing Data – May 7, 2013
In an interview with TechRepublic, Jerry Irvine explained what companies need to know about Google’s latest feature. Read more here.

Jerry Irvine featured in USA Today – May 6, 2013
In an interview with Byron Acohido, Jerry Irvine provided insight on the planned hacking attack on banks and credit unions. Read more here.

Help Combat Intellectual Property Theft – May 2, 2013
The bring your own device movement is sweeping through corporations, increasing productivity and collaboration. But figuring out how to secure devices remains a top concern for HR departments. Jerry Irvine provides tips for preventing IP theft here.

Specialized IT Project Managers Are in Demand – May 1, 2013
In his ongoing column in SC Magazine, Jerry Irvine provided insight on the skills needed to become an IT project manager. Read more here.

The Security Certification Debate Continues – April 25, 2013
The value of security certifications for IT professionals has long been debated. Jerry Irvine shares his thoughts on why they still add value. Read more here.

Jerry Irvine featured on ABC 7 Chicago – April 23, 2013
In an interview with Ben Bradley from ABC, Jerry Irvine discussed the hacking of The Associated Press’ Twitter account. Watch the interview here.

Jerry Irvine featured on CFO webcast – April 22, 2013
In a webcast with CFO magazine, Jerry Irvine provided expertise on the protocols companies should be implementing to address shadow IT risks. Download the webcast here.

How Valuable Are Security Certifications Today? – April 1, 2013
In an article by  Lauren Gibbons Paul, Jerry Irvine provided his perspective on the value of certifications for IT professionals. Read more here.

Hackers Up the Ante for Small-Business Data Security – March 14, 2013
In an interview with Elaine Pofeldt, Jerry Irvine provided guidance on how small businessess can protect themselves from hackers. Read more here.

Why You Should Consider an IT Audit – March 7, 2013
In an interview with Sheryl Nance-Nash, Jerry Irvine explained that personally-identifiable information is becoming a huge target for hackers. Read more here.

Cloud Computing: Where Are We Now? – March 6, 2013
In an interview with Michael McDermott, Jerry Irvine provided expertise on how the cloud is impacting small businesses. Read more here.

Hot Security Skills of 2013 – March 3, 2013
In an interview with CSO Magazine, Jerry Irvine provided expertise on the skills needed to become a CSO. Read more here.

Fear Factor: Why Security Is Still the Cloud’s Biggest Hurdle – Feb. 25, 2013
In an interview with CRN, Jerry Irvine provided expertise on how organizations can protect their data while operating in the cloud. Read more here.

Threat of the Week: What the President’s Cyber Security Directive Means to You – Feb. 15, 2013
In an interview with Credit Union Times, Jerry Irvine offered his perspective on President Obama’s executive order on cybersecurity. Read more here.

Banks Fear Liability from Obama Cybersecurity Plan – Feb. 12, 2013
In an interview with Evan Weinberger, Jerry Irvine offered insight on how banks might be impacted by President Obama’s executive order on cybersecurity. Read more here.

Are You Minimizing Your Travel Risks – Feb. 1, 2013
In an interview with Global Traveler, Jerry Irvine provided expertise on how business travelers can keep their information safe while overseas. Read more here.

Jerry Irvine featured in SC Magazine – Feb. 1, 2013
In an ongoing SC Magazine column, the Prescient CIO explained why automation systems professionals are in demand. Read more here.

Jerry Irvine featured on NBCnews.com – Jan. 30, 2013
In an article by Sue Marquette Poremba, Jerry Irvine provided tips for protecting smartphones from malicious applications. Read more here.

How to Lock Down Your Android and Lock Out Malware – Jan. 30, 2013
In a TechNewsDaily article, Jerry Irvine offered insight on how to protect a mobile device from malicious applications. Read more here.

Three Tips for Keeping Your Personal Information Safe – Jan. 29, 2013
In a blog post featured on Stay Safe Online, Jerry Irvine offered insight on easy ways you can protect personal information online. Read more here.

IT’s Top Budget Busters – Jan. 22, 2013
In a bylined article on FierceCIO.com, Prescient CIO Jerry Irvine detailed why so many companies outspend their IT budgets. Read more here.

What’s on Your Smartphone? – Jan. 14, 2013
In an article by Robert McGarvey, Jerry Irvine explained why all is not lost if you’ve misplaced your mobile device. Read more here.

Jettisoning Java: Damned If You Do, Damned If You Don’t – Jan. 12, 2013
Our CIO Jerry Irvine provided guidance to businesses utilizing Java amid cybersecurity concerns to the platform. Read more here.

Three Biggest Myths About Business Continuity Planning – Jan. 11, 2013
Prescient’s blog post about disaster recovery and business continuity planning was featured by Disaster Recovery Journal. Read more here.

Jerry Irvine featured on First Business – Jan. 9, 2013
In a TV interview with Bill Moller, CIO Jerry Irvine provided insight on the strengths and weaknesses of antivirus solutions. Watch the interview here.

7 Deadly Sins of Cloud Computing – Jan. 2, 2013
Our CIO Jerry Irvine provided expertise on mistakes companies make when switching to cloud-based technology. Read more here. 

How to Protect Yourself While Using Shopping Apps – Dec. 31, 2012
In an article by Katie Gatto, Jerry Irvine explained why shopping on your smartphone can be hazardous to your personal information. Read more here.

How to Prepare Your VoIP System for Disaster – Dec. 17, 2012
In an interview with Cindy Waxer, Jerry Irvine shares best practices for utilizing a VoIP system to maintain business continuity. Read more here.

Top Five IT Budget Busters and How to Avoid Them – Dec. 13, 2012
In an interview with Robin Miller, Jerry Irvine provided guidance for organizations setting their IT budgets. Watch the interview here.

When In China, Don’t Leave Your Laptop Alone – Dec. 4, 2012
In an interview with Bob Violino from InfoWorld, Jerry Irvine explained the challenges of data protection while traveling overseas. Read more here.

Skills in Demand: System Engineers – Dec. 3, 2012
In an SC Magazine article, Jerry Irvine detailed the skills employers are looking for when hiring a system engineer. Read more here.

Prescient CIO featured in MarketWatch – Nov. 29, 2012
In an interview with MarketWatch’s Rex Crum, Jerry Irvine provided tips for protecting data while shopping on your smartphone. Read more here.

Why More SMBs Are Reaching the Virtualization Tipping Point – Nov. 27, 2012
Our CIO Jerry Irvine detailed the value of virtualization for businesses with physical servers. Read more here.

2013 Small Business Trends: Known Unknowns Ahead – Nov. 27, 2012
Jerry Irvine provided insight on IT hiring trends on Monster.com. Read more here.

Cyber Monday 2012 Sales Require Security Awareness – Nov. 26, 2012
In an interview with ABC7’s Leah Hope, CIO Jerry Irvine provided tips on how to keep your data safe while shopping online. Watch the interview here.

Jerry Irvine featured on ABC7 Chicago – Nov. 26, 2012
In an interview with Judy Hsu of ABC7, Jerry Irvine provided insight on how consumers can protect themselves while shopping online. Watch the full interview here.

Prescient CIO Foresees IT Challenges Ahead – Nov. 16, 2012
Jerry Irvine provided insight on the issues facing IT departments in Enterprise Efficiency. Read more here.

Five Steps to Prepare Employees, Business for Natural Disasters – Nov. 9, 2012
Jerry Irvine stressed the importance of developing a business continuity plan to properly prepare for business interruption in BenefitsPro. Read more here.

How to Become a Security Analyst – Nov. 5, 2012
In an article by Ian Palmer of Infosec Institute, CIO Jerry Irvine provided guidance on what IT companies look for when hiring a security analyst. Read more here.

Hurricane Sandy Tests Business Continuity, Disaster Recovery – Oct. 31, 2012
In an interview with SC Magazine, Prescient Solutions’ Jerry Irvine explained that business continuity plans are important differentiators in determining how quickly organizations recover from a disaster. Read more here.

The State Of ETL: Extract, Transform And Load Technology – Oct. 8, 2012
In a Data Informed article by Alan Earls, Jerry Irvine detailed how businesses of all sizes are using ETL technology. As Irvine explained, it’s not just for data warehousing. Read more here.

Jerry Irvine featured on First Business – Sept. 18, 2012
In an interview with Bill Moller, Irvine provided insight on the emerging threat that hackers pose to smartphones. Watch the full interview here.

Mobile CRM’s Tricky Back End – Sept. 11, 2012
In a CRM Buyer article, Jerry Irvine provided best practices for organizations integrating mobile CRM into their business. Read more here.

Patient Hackers Pose Growing Threat To Insurance Companies Large And Small – Sept. 4, 2012
In an article by Anthony O’Donnell, Jerry Irvine provided insight on advanced persistent threats. Read more here.

Jerry Irvine featured in Global Finance – Sept. 1, 2012
In an article by Paula Green, our CIO provided insight on the state of cyber risk. Read more here.

Prescient Solutions featured on Interest.com – Aug. 22, 2012
In an article by Rich Mintzer, Jerry Irvine provided insight on email scams and how to protect your identity online. Here.

The Growing Pains of BYOD – Aug. 20, 2012

In an article authored by our CIO, Jerry Irvine discussed the security challenges of implementing a BYOD policy. Read the full article here.

Finding New Infrastructure Solutions – Aug. 20, 2012
In an article in Homeland Security Today, Jerry Irvine provided insight on the latest trends in viruses and cybersecurity. Read the full article here.

Jerry Irvine featured on HP Input/Output – Aug. 8, 2012
In an article by Lisa Vaas, Irvine discussed the job market for cybersecurity professionals and what companies look for when hiring for InfoSec positions. Read more here.

Prescient Solutions featured on Tech Talk – Aug. 5, 2012
In an interview with Craig Peterson of Tech Talk radio, Jerry Irvine discussed the cybersecurity risks associated with the 2012 Summer Olympics and how hacking has changed over time. Listen to the full interview here.

IT Skills in Demand – Aug. 1, 2012
In ongoing SC Magazine column, Jerry Irvine provided insight on the high demand for business continuity and disaster recovery specialists. Read more here.

Jerry Irvine interviewed on NBC Chicago – July 9, 2012

In an interview with NBC Chicago, Irvine discussed the potential implications of the DNS Malware virus and provides best practices for avoiding a virus. Watch here.

Prescient Solutions featured in SC Magazine – July 2, 2012
In an article by Alan Earls, Jerry Irvine provided tips on how companies can improve their data protection and information security. Here.

Prescient Solutions featured on CNBC – May 29, 2012
In an article by CNBC reporter Mark Koba, Jerry Irvine shared his thoughts on the current state of the tech worker shortage. Article here.

Jerry Irvine featured on About.com – May 18, 2012
In an article written by our CIO, Irvine provided an overview of CISPA and covered all sides of the debate. Read more here.

Prescient Solutions featured on ABC – May 17, 2012
In an interview on WLS-TV, Jerry Irvine detailed that hacking groups view the NATO Summit in Chicago as a platform to gain publicity and notoriety. Watch here.

Irvine provides Insight on CISPA – May 17, 2012
In an interview with The Tech Guy, Jerry Irvine explained why he’s in favor of CISPA and feels it’s the best option available. Learn more about CISPA and read the full interview here.

Prescient CIO Featured in Crain’s Chicago Business – May 3, 2012
In an article by Crain’s Chicago reporter Danny Ecker, Irvine explained that everyone is at risk for attack during the NATO Summit. Article here.

Jerry Irvine featured in SC Magazine – May 1, 2012
CIO Jerry Irvine discussed IT skills currently in demand by organizations. Read his article here.

Prescient Solutions on WGN Radio – March 31, 2012
In an interview with WGN Radio’s Bill Moller, Jerry Irvine discussed cyber security and the hacking group Anonymous. Link not available.

Prescient CIO in SC Magazine – March 3, 2012
In an SC Magazine article by Jim Romero, Irvine gave his thoughts on the growing trend of hacktivism here.

Irvine Provides Insight to TechNewsWorld – Feb. 28, 2012
In an article titled “Are Security Vendors Living in Glass Houses?” Prescient CIO Jerry Irvine emphasized the importance of disclosing data breaches to avoid placing customers at risk. Read the TechNewsWorld article here.

Debate over Cyberspace Legislation – Feb. 15, 2012
In an AOL Government article discussing proposed cybersecurity legislation, Jerry Irvine advocated for more transparency among all organizations and cautioned that the bill might place an inordinate burden on the private sector. Learn more about the legislation and read Irvine’s comments here.

Prescient CIO Quoted in New York Times – Feb. 14, 2012

One year after hacking collective Anonymous penetrated the website of Combined Systems, reporter Nicole Perlroth sought guidance on how organizations can decrease the likelihood of an attack. Jerry Irvine advocated for companies allocating more financial resources to protecting their IT. View the full article here.

Irvine Featured Guest on FOX Chicago News – Feb. 13, 2012
Appearing on “Good Day Chicago” with Corey McPherrin and Anna Davlantes, Irvine provided tips to help online consumers protect themselves. Refraining from using email addresses as user ids and not allowing websites to save credit card information were among the points that Irvine outlined. Watch the segment here.

New York Times Article Features Irvine – Feb. 10, 2012
In an article by New York Times reporter Nicole Perlroth, Irvine analyzed an attack on the C.I.A. website by Anonymous and the potential of future occurrences. Read the full article here.

Hacks on VeriSign System Brings Concerns for Security Industry– Feb. 3, 2012
Two years following the incident, VeriSign, an infrastructure company, acknowledged that their system has been compromised by an attack in 2010. Irvine was quoted in the E-Commerce Times regarding the lack of confidence that users have in the security of their data online. View the article by reporter Erika Morphy here.

Irvine Discusses Cloud Technology in PC Today – Feb. 1, 2012
In an article titled “Cloud Critics”, Irvine offered his expertise for businesses contemplating the use of cloud technology and cautioned against putting their entire application system on cloud. Read the article and Irvine’s guidance here.

Interview on WGN Radio – Jan. 28, 2012
In honor of Data Privacy Day, an international celebration aimed at raising awareness about piracy and best practices, Irvine was interviewed on WGN Radio by reporter Bill Moller. Listen to the interview here.

Data Privacy Day Interview on WTMJ-AM – Jan. 28, 2012
Appearing on WTMJ-AM in Milwaukee with host Michelle Fiore, Irvine conversed about Data Privacy Day. No hyperlink of the interview is currently available.

Data Privacy Day Interview on First Business – Jan. 27, 2012
In advance of Data Privacy Day, Irvine was featured in an interview with Bill Moller. Watch the full episode here.

New York Times Features Irvine’s Recommendations for Online Consumers – Jan. 17, 2012
After a security breach at Zappos compromised their massive customer database, Irvine provided advice to the New York Times on how consumers can better protect themselves. View the full articlehere.

Irvine Delivers Expertise in New York Times Article – Dec. 25, 2011
Following a highly publicized attack by hackers, Irvine cautioned that all websites have some level of vulnerability in a New York Times article titled “Hackers Breach the Web Site of Stratfor Global Intelligence.” See the full article here.

IT Hiring Trends in CIO – Dec. 1, 2011
“Six Hot IT Jobs That Will Pay Well in 2012” included quotes from Irvine regarding recent software developments and an increase in IT jobs within the marketplace. The CIO article can be found here.

Irvine Featured in PC Today – Nov. 1, 2011
The Prescient Solutions CIO provided his recommendations for a computer security system and detailed the costs associated with incorporating the infrastructure. Read the entire PC Today article here.

Analysis of the IT Job Market in Computerworld – Oct. 5, 2011

In “IT Industry Shrinks as Employer in Past Decade”, Irvine provides perspective on the current state of hiring in the IT industry and the challenges of finding versatile candidates. Read the Computerworld article here.

Irvine Quoted in CRN Article – Sept. 22, 2011
In an article titled “Five Ways to Get a Piece of the Cloud Market”, Irvine advised on best practices for securing data while incorporating cloud technology. View the full CRN article by Jennifer Bosavagehere.

Cyber Security Interview on First Business – July 26, 2011
CIO Jerry Irvine, a member of the National Cyber Security Task Force, was a featured guest on an episode of First Business with Bill Moller. Irvine provided his expertise on cyber security. Watch the full episode here.

Travelers, beware! Hacking lurks in plugs and ports – December 20, 2016 – USA Today

We’re all guilty of bringing too many gadgets along when we travel. But using local Wi-Fi and public outlets can put you at risk for cyber threats. Here’s how to keep your personal information private while traveling.

EMV migration delay doesn’t let gas stations completely off the hook – December 8, 2016 – CSO

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t mean that gas stations can now relax their EMV upgrade plans.

Chicago Theater customer data may be compromised by data breach – November 22, 2016 – WGN TV

A massive data breach was reported Tuesday by the owner of the historic Chicago Theater.

“Hacker Lab” Event Shows How Cyber Criminals Attack Homes – November 16, 2016 – Claims Journal

The October 13 workshop in New York City mounted a remote cyber-attack on an Internet-connected model home inside the American Modern Insurance Group claims training facility in Ohio. The event demonstrated in real time how hackers choose their targets, enter a system, and the harm they can do once they infiltrate a home.

Robots present a cyber risk – November 9, 2016 – CSO

Experts say the growing use of robots by companies such as manufacturers, retailers, healthcare institutions and other businesses can present a number of cyber risks.

How Your IoT Devices Turned Into a Zombie BotNet – October 24, 2016 – GearBrain

The flat-lining of many famous websites on Friday started right from your home. Maybe not your home—but someone’s. The Distributed Denial of Service attack (also known as a DDoS attack) started at about 7 am ET Friday, in essence turning off the valve to many web sites.

Why Seemingly Infallible File-Sharing Apps Go Dark, And What Is Being Done To Stop It – October 19, 2016 – Forbes

We’ve taken for granted the ability of file-sharing apps to pull up a presentation minutes before an important sales pitch or panel session. But what if, for some reason, the technology failed to work?

Top Tips for Protecting Your Devices From Cyberattacks – October 19, 2016 – Credit.com

Here are a hacker’s top tips for protecting your devices from cyberattacks.

7 ways to keep your smart home from being hacked – October 17, 2016 – MarketWatch

In the modern home, everything from TVs and refrigerators to baby monitors and lightbulbs can now be connected — and hacked.

Chip & Pin Technology More Secure – October 3, 2016 – WGN TV

Jerry Irvine discusses chip/pin technology.

From faces to fingerprints, keeping biometric information safe is a growing concern – August 24, 2016 – WGN TV

Biometrics are a security resources that are getting more wifely used when it comes to shopping, banking and traveling. It’s all good, unless it somehow gets into the wrong hands. It’s all biometric information and once it’s gone or stolen, how do you get it back? The answer: You can’t.

Going On Vacation? How To Protect Yourself From Online Threats – August 22, 2016 – Forbes

Connecting to a corporate network while on vacation can be dangerous — even more so than connecting while on a business trip. Vacationing employees may not be focusing on security when they’re checking email or accessing office documents. Procedures that may be top-of-mind in the workplace can take aback seat.

Cyber extortion risks increase as threats grow more sophisticated – August 7, 2016 – Business Insurance

Cyber extortion is a growing threat across industries, and particularly health care organizations, as criminals cast their nets wider using increasingly sophisticated malicious code.

6 Myths About Credit Cards — Busted – August 4, 2016 – GOBankingRates

Many cardholders hold false beliefs about how these pieces of plastic work. Here are six credit card myths, debunked.

Experts: SentinelOne Ransomware Guarantee No Replacement for Cyberinsurance – August 1, 2016 – CSO Magazine

Earlier this week, SentinelOne announced that it will reimburse customers for up to $1 million if they are hit by a ransomware attack, but some experts say that this is a marketing gimmick and no replacement for a solid cyberinsurance policy.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – PCWorld

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

The Dangerous Cost of “Free” Wi-Fi – July 29, 2016 – CIO Magazine

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage.

Keeping Your Data Safe During Summer Travel – June 27, 2016 – FOX 32

Jerry Irvine discusses keeping your data safe during summer travel.

5 Tips For Staying Cyber-Secure On Your Summer Vacation – June 20, 2016 – InformationWeek Dark Reading

Summer is officially here, and with that comes vacation season. But before you go, make sure you’re following these simple steps to stay cyber-secure while you soak up the sun:

Staying Safe on the Road: Infosec for Smart Travelers – May 31, 2016 – Secure Thoughts

It is a war for your data when you travel. The irony is that many, many pages are filled with advice on how to avoid pickpockets in Rome, muggers in Manhattan, and crooked taxi drivers in Rio.  But bad as those threats to your safety and wealth may be, you have a lot more exposure to real – and huge – risks that arise with theft of your information, your identity, your banking specifics.

Mobile devices: A better route to ID security – May 31, 2016 – GCN

In the federal government, Common Access Cards and personal identity verification cards for employees and contractors incorporate biometrics and give agencies a better foundation for security and ID management than many private-sector organizations enjoy. But that wasn’t always the case.

Cybersecurity for Small Businesses: You’re Never Too Small to be Safe – May 23, 2016 – NCR Silver

You would never leave your cash register open to thieves. But are you inadvertently leaving your corporate data and your employees’ personal information open to hackers?

SDN – A Step Forward or Backward for Infrastructure Security? – May 23, 2016 (Page 31-32) – Enterprise Networking

Software-defined networking (SDN) segments the major functions of networking into the control layer and transfers all networking functionality to a control host(s), leaving only packet forwarding functions at the switch level.

Ransomware attacks prompt warnings to House members – May 11, 2016 – SC Magazine

Members of the US House of Representatives and staffers received warnings that the House network has received a rise in attempted ransomware attacks.

Digital Vulnerability: Can hackers turn your vehicle into a remote control car? – May 6, 2016 – WGN TV

It can happen. Hackers– the criminal kind — can take over your car and do anything remotely that you as the owner can do electronically.

Digital Vulnerability: Cyber security expert on preventing your social media from being hacked – May 6, 2016 – WGN TV

In today’s world of technology and social media, the security of our personal information is a huge concern.

Digital Vulnerability: How safe are you on social media? – May 5, 2016 – WGN TV

While millions, even billions, are connecting on social media worldwide, what are the pictures, the captions, the details of your page really telling about you. Could it land you in trouble or even put you in danger?

Protecting Data Wherever it Lives – May 5, 2016 – GCN

Data encryption addresses four major areas: data in motion, data stored on user devices, data stored on servers and data that is currently being used.

Stolen Passwords – May 5, 2016 – FOX 32

One of the biggest stashes of stolen e-mail passwords ever and they are all up for grabs to hackers worldwide. over 272 million stolen google yahoo! and microsoft e-mail addresses and passwords are being traded in russia’s criminal underworld. and that means it may be time for you to update your password.

Digital Vulnerability: The Dangers of Webcams – May 3, 2016 – WGN TV

This installment focuses on webcams. Could someone be watching and you’d never know it? The answer? You bet they can.Anywhere you find those tiny little lenses, someone is capable of recording, maybe even streaming video and sound of you.

Digital Vulnerability: How safe is the Wi-Fi you’re using? – May 2, 2016 – WGN TV

This is a look at what you might be giving away when you simply tap into public Wi-Fi.

Password Protection – April 28, 2016 – Independent Banker

Software can secure and manage employees’ login credentials.

Hackers Branching out to Law Firms – April 5, 2016 – Business Insurance

Hackers are moving away from a focus on obtaining personally identifiable information and more towards “soft” targets including law firms.

Health Care: Cyberattacks Spook Device Makers – April 3, 2016 – San Fernando Valley Business Journal

Cyberattack nurses security fears of device makers.

Should CIOs worry about the Internet of Hackable Things? – February 16, 2016 – CIO from IDG

From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?

Internet of hackable things? Why IoT devices need better security –February 8, 2016 – The Enterprisers Project

The Internet of Things is amazingly powerful and useful — but not always safe to use, and most organizations with IoT implementations need to do a better job of keeping them secure.

The Three Largest Cyber Security Risks of the Decade Converge: Cloud Computing, BYOD, and IoT – Enterprise Networking

Weak Authentication: Agencies Slow to Fix Security Gaps – GovTech Works

The dark side of layered security – November 13, 2015 – CSO from IDG

Layered security is currently considered a best practice for enterprises, but sometimes these layers can have unintended consequences. Our CIO, Jerry Irvine, explains in this CSO Online article.

Weak Authentication: Agencies Slow to Fix Security Gaps – November 3, 2015 – GovTech Works
Two-factor or “strong” authentication requires users to provide at least two means of identification to access a system. Learn more.

Jerry Irvine: How to protect yourself online – October 14, 2015 – FOX 32
The month of October is Cybersecurity Awareness Month, making it the perfect time to take a step back to make sure you are protecting yourself both personally and professionally.

Appetites for more: Government actions – October 1, 2015 – SC Magazine
Cybersecurity is a technical challenge. But it also usually has a legal and regulatory aspect as well.Read more.

Chip-pin credit card 101 – October 1, 2015 – WGN TV
Starting today, major credit card companies must have rolled out the new chip-pin credit cards and stores should have the technology to read those cards. Our CIO, Jerry Irvine, has a quick lesson on how it all works.

Security experts mostly critical of proposed threat intelligence sharing bill – September 10, 2015 – CSO from IDG
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA.

EMV transition will still leave security gaps – September 8, 2015 – CSO from IDG
This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments.

Cybersecurity Professionals: The Government Wants You – July 20, 2015 – IEEE USA

Federal, state and local government agencies needs tens of thousands of cybersecurity employees just to fill existing job slots.

Data explosion offers challenges, opportunities to security pros – July 17, 2015 – CSO from IDG
Big Data analytics helps companies process all this information, prioritize the most significant threats, and weed out random noise and false alerts.

NYSE trading halt an insurance coverage wake-up call – July 14, 2015 – Business Insurance

Last week’s disruption of the New York Stock Exchange because of an apparent computer glitch may not have had a dramatic impact on the markets, but it should serve as a reminder to companies.

Encryption: What Does It Protect, What Are The Risks … And Is It Enough? – July 13, 2015 – HS Today

CIO Jerry Irvine discusses if today’s encryption technology really provides the level of confidentiality required in this totally Internet connected world.

Computer glitches expose vulnerability of critical infrastructure – July 10, 2015 – Security InfoWatch
Operations at the New York Stock Exchange, United Airlines and Wall Street Journal were severely impacted by what officials say are unrelated technical glitches in their respective computer systems.

Summer Travel Scam Targets Your Points and Miles – July 9, 2015 – CIO Magazine
How sure are you that the airlines miles and hotel rewards points you’ve been hoarding for years will be there when you go to redeem them.

Cyber Expert: Potential for Insured Losses in Technical Glitches That Hit NYSE, Wall Street Journal and United Airlines – July 8, 2015 – A.M. Best
Technical problems hit the New York Stock Exchange, United Airlines and the Wall Street Journal all on July 8, but one cyber security expert said the glitches so far appear to be separate incidents.

NYSE, United Airlines Shutdowns Spark Paranoia – July 8, 2015 – InformationWeek
United Airlines and the New York Stock Exchange both experienced massive outages this morning. The causes are slowly coming to light.

New Cybersecurity Council backs info sharing legislation – July 7, 2015 – Federal Times
The U.S. Chamber of Commerce announced its new Cybersecurity Leadership Council bringing together businesses interested in promoting best practices across the private and public sector.

Who’s Winning the Mobile Payments War? – June 29, 2015 – Network World
Mobile payments haven’t taken off. Yet. Read more.

Mobile Security: The Coming Battle of Hardware vs. Software – June 18, 2015 – CSO from IDG
According to security experts, there are several paths forward to mobile payments, each with its own security implications.

The OPM Hackers Have Your Data — Now What? – June 5, 2015 – Federal News RadioFederal employees who learn their data was stolen in the recent, record hack need to take several stepsquickly to mitigate their risks.

Massive Data Breach Puts Spotlight on Shared IT Services – June 5, 2015 – Government Executive
A breach that impacted records for 4 million federal employees has raised questions about the future of shared services. Learn more here.

Top In-Demand Skills for Cloud Security – May 15, 2015 – Cyber CodersThe demand for cloud security gurus continues to grow. Click here for the must-have skills.

Don’t Assume You’re Too Small to Attract Cybercrime – April 30, 2015
You don’t need to be a multi-million dollar business to be vulnerable to a cyber attack; many small- and medium-size businesses represent an easy target to would-be criminals. Read more here.

Boards Are on High Alert Over Security Threats – April 27, 2015
Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company’s security posture and steer the conversation toward managing business risk. Read more here.

Implantable Devices: Medical Devices Open to Cyber Threats – April 8, 2015
The threat of hacking implantable defibrillators and other devices is already growing. Read more here.

Report: Breach Exposed Obama Records – April 7, 2015
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president’s schedule. Learn more.

Tech Pros Need Business Skills, Too – March 24, 2015 
Check out the latest IT job ads and you’re more likely than ever to find employers asking for candidates with a strong understanding of business operations in addition IT skills. Read more about those must have skills here.

Agencies Navigate the Identity-Based Security Ecosystem – March 6, 2015
Identity systems – and the electronic formats for managing them – have become the top priority for organizations looking to safeguard the government data attackers now target.  Learn more here.

Feds Warn Computer Users of Ransomware – Feb. 23, 2015
The FBI has issued warning about a growing type of malicious Internet software that could take your computer hostage, along with all the data stored on it.  Learn more here.

What NFV Vendors are Currently on the Market? – Feb. 18, 2015
Many data centers are on the path to NFV. How are the NFV standards and vendor offerings guiding — or challenging — implementation? Get the latest insights.

Omaha’s Scoular Co. Loses $17 Million After Spearphishing Attack – Feb. 13, 2015
Prescient CIO Jerry Irvine offers advice to help organizations guard against spearphishing.

Microsoft Packing More Patches into Fewer Bulletins – Feb. 12, 2015
Microsoft is packing more common vulnerability exposures into its critical bulletins. Learn more here.

Decoding Tech Jargon – Winter 2015 
Prescient CIO Jerry Irvine offers up this handy guide to nine words and phrases that will help your organization make smarter cybersecurity decisions.  Read the full story on page 24.

Prescient Solutions Nets Award in ADP’s “Beyond the Startup” Contest – Jan. 20, 2015
Prescient Solutions won second place in ADP’s annual “Beyond the Startup” contest. Read more here.

Why Police Need to Hack into CCTV Systems in Paris and Elsewhere – Jan. 12, 2015
What good are the millions of surveillance cameras populating private and public property worldwide, if emergency responders can’t immediately obtain real-time footage?

Building a Better Security Budget – December 26, 2014
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization. Read more here.

Hack the Herald Angels Sing – December 8, 2014
What’s behind the recent hack at bebe?  Find out here.

What the Internet of Things Means for Your Business – December 3, 2014
Learn more about what small and mid-sized businesses need to know with these insights.

New Credit Card Security Rules Squelch Retailers’ Holiday Spirit – December 2, 2014
Retailers have one more thing to worry about during the year-end sales push.

Cyber Monday Scams – December 1, 2014
Buyer beware during the holiday season. Watch this First Business report to learn about the latest shopping scams.

Watch Out for These Three Holiday Shopping Scams – November 26, 2014
Whether you shop online or at the mall, look out for these three scams.

Five Reasons IT is Scared of Mobile Security – November 19, 2014
Despite the uptick in hacks, a recent study shows corporate IT isn’t investing enough in mobile security. Read why not here.

Does More Technology Equal a Safer Home? – November 19, 2014
With the influx of home automation technology comes a whole new breed of criminal for homeowners to guard against.  Find out how to defend your domain here.

27 Data Security Experts Reveal the #1 Information Security Issue Most Companies Face with Cloud Computing & Storage – November 12, 2014
Just like traditional storage and data sharing methods, cloud computing comes with its own set of data security issues. Read here for insight from the pros on the top issues.

Why Trendsetting Companies Change Course on Cloud Security – November 12, 2014
More small and mid-sized businesses are migrating to the cloud.  Find out why.

Experts: Take Stolen Email Addresses Very Seriously – November, 12, 2014

Prescient talked to Consumers Digest about the potential fallout from stolen email addresses and how to protect your accounts.  Read more here.

Changing the Security Mindset – October 29, 2014
As cyber attacks increase in number and complexity, financial services firms need to get more proactive in their security measures.  Read more here.

Business Phone Hacks – October 21, 2014
It’s easier than you think for hackers to get into your phone, and once they’re there it becomes a gateway to all kinds of private information.  View the First Business segment here.

Don’t Let the Machines Takeover: The 5 Basics of Smart Home Security — Oct. 10, 2014
Make your smart home even smarter with these security tips. Read more here.

Home Depot, Apple Cyber Attacks Highlight Variety of Methods Used by Hackers – September 14, 2014
The common denominator in both these cases is that hackers attacked the weakest link, according to Prescient CIO Jerry Irvine. Read more here.

Employers’ Wearable Device Policies Should Control and Restrict Use – September 14, 2014
A wearable device policy is a must for any company. Read what you should include in yours here.

What Does the Alleged iCloud Attack Mean for Federal Agencies? – September 2, 2014
The iCloud hack highlights concerns with federal employees accessing sensitive information on personal devices. Find out how agencies can take a smarter approach to security here.

The War Without End – September 2, 2014
Retailers face an impossible challenge when it comes to Internet security. Read more here.

First Business Looks at the JPMorgan Hack – August 29, 2014
Get insight into the hack and learn how to create a smarter password. (advance to 7:31).

Unsecured Smart Home Systems Leave Homeowners, Enterprises Vulnerable – August 26, 2014
Unsecured home security and automation systems could also serve as backdoor to hackers seeking access to a greater prize — corporate data on your smartphone.  Learn how to minimize your risks here.

Internet of Things (IoT) Poses Challenges for DevOps and Security – August 25, 2014
The emergence of IoT is driving the need for a mindset change.  Here’s what you need to know.

After Jewel, UPS, How do Consumers Stay Safe from Data Hacks? – August 22, 2014
The hacks keep coming and consumers need to get serious about their personal cyber security.  Read Jerry Irvine’s advice here.

Jewel-Osco Customers’ Credit Card Data May Have Been Compromised – August 16, 2014
Jerry Irvine shares insight with the Chicago Sun Times into the Supervalu hack and its impact on Chicagoland customers.

CISA Puts Congress in a Tough Spot – August 10, 2014
Can the Cyber Security Information Sharing Act be an effective tool against hackers and other cyber criminals? Get insight here.

1.2 Billion Passwords Compromised – Now What? – August 8, 2014
Prescient CIO Jerry Irvine has security advice in the wake of the largest hack in history.  Get it here.

Dos and Don’ts for Feds on Vacation – August 1, 2014
Prescient offers tips for federal government employees who plan to hit the road this summer.  Check them out here.

How Safe is Safe Enough? – August, 1, 2014
Small accounting firms face big cybersecurity challenges.  Read Prescient’s advice on how to minimize the risks here.

Summer Travel Cyber Security Tips For Government Employees – July 23, 2014
Vacationing as a government employee has its own set of cybersecurity concerns.  Read what to watch for and how to lessen the risks here.

Into the Breach: Midstate Experts Say Data Breaches are Inevitable – July 20, 2014
Can information sharing help companies do a more effective job at cybersecurity? Read more about this and other strategies here.

Agencies Inch Toward Solutions on BYOD – July 18, 2014
Jerry Irvine offers insight into the increasingly complex world of BYOD security for government agencies.  Read the Government Technology story here.

Cyberattacks Focus Employers on Security Certifications – July 9, 2014
What are all of these certifications and which make the most sense for you? Read more here.

Beef Up Your Security and Avoid Being a Victim on Vacation This Summer – July 8, 2014
Jerry Irvine talks about smart cyber security tactics for summer travel here.

Coffee Break: Jim Lagattuta – July 7, 2014
Learn more about Prescient and its CEO with this Business Ledger Q&A here.

How Developers Battle Security Bugs – June 27, 2014
Jerry Irvine talks about behind the scenes efforts to mitigate risks in our cyber world here.

Could Your Smart Home Be Hacked? – June 6, 2014
Get Jerry Irvine’s thoughts from U.S. News and World Report here.

Into the Breach – June 2, 2014
Jerry Irvine weighs in on the current cyber security climate and potential for government regulation here.

Internet Explorer flaw not yet patched by Microsoft – April 30, 2014
USA Today gets Jerry Irvine’s suggestions for working around the flaw here.

Does Heartbleed have the Power to take our energy? – April 27, 2014
The Morning Consult gets Jerry Irvine’s thoughts here.

Does the Healthcare Industry need to be more wary of Heartbleed? – April 27, 2014
Jerry Irvine discusses healthcare security with The Morning Consult here.

Federal Websites Avoid Hearbleed Risks – April 14, 2014
NextGov features some of Jerry Irvine’s thoughts here.

What’s the prognosis with Heartbleed? – April 11, 2014
Govt. Computer Technology offers Jerry Irvine’s advice for the long-term here.

Heartbleed Bug Brings Up Lots of Questions – April 11, 2014
Bill Moller talks with Jerry Irvine about Heartbleed here.

Are you safe from Heartbleed? – April 9, 2014
You’ve heard the rumors. Government Technology may offer answers here.

Is the end of Windows XP support going to lead to a major hacker attack? – April 8, 2014
Jerry Irvine talks Windows XP zombie apocalypse with Bloomberg here.

Is the Smart Home a Dumb Choice? – April 4, 2014
Akron Beacon Journal gets Jerry Irvines take on Smart Technology here.

Bill Moller Investigates the IoT on First Business News – April 1, 2014
Jerry Irvine, CIO of Prescient Solutions, explains how to protect your gadgets from hackers.

Insights and Analysis on all things “Cyber” – March 28, 2014
Jerry Irvine’s profile featured in Homeland Security Today here.

Let the Buyer Beware with the Internet of Things – March 25, 2014
Jerry Irvine gives CIO.com warnings about the IoT here.

How consumers can prevent from becoming victim of hackers – March 19, 2014
Listen to Jerry Irvine on the WBBM-AM Noon Business Hour here.

Can data lakes solve cloud security challenges – March 18, 2014
CSO Online includes Jerry Irvine’s thoughts on the use of data lakes here.

If not secured, smart homes are just begging to be hacked – March 17, 2014
Jerry Irvine shares more about the Internet of Things with CSO here.

Should your information be swimming in the Data Lake? – February 28, 2014
Irvine details data lakes to the Enterprise Efficiency readers here.

First American Bank reports Chicago Taxi data breach – February 28, 2014
CSN Chicago interviews Jerry Irvine on taxi cab hacking here.

Blue Cross Parent Company initiates ethical hacking plan – February 25, 2014
Prescient reveals to Crain’s why some Chicago businesses self hack here.

Fierce CIO discovers the curveballs in Big Data Infrastructure – February 24, 2014
In Part 3 Jerry Irvine provides check points for Big Data Vendors here.

Contactual matters for Big Data in the Clouds – February 24, 2014
In Part 2 of 3 Jerry Irvine shares info on big data back-ups here.

Problems of infrastructure for Big Data Analytics – February 24, 2014
Fierce CIO gets Irvine’s view on big data search in Part 1 of 3 in a series.

Useful Tools for Small Businesses to Avoid Date Breach – January 17, 2014
Grand Rapids Business Journal Interviews Jerry Irvine to find useful tools for small businesses here.

Internet of Things Pokes Holes in IT Security – January 15, 2014
Government Technology News shares Jerry Irvine’s insights into the Internet of Things here.

Learn Ways to Protect Against Data Breach as shared with First Business – January 14, 2014
Jerry Irvine shares ways to protect yourself from a data breach here.

WBBM-AM Noon Business Hour Segment discusses Retail Cybercrimes – January 13, 2014 
Hear Jerry Irvine discuss security measures with the WBBM-AM crew here.

Security Measures You Can take to Avoid Being the Next Target – January 14, 2014
Watch NBC 5’s Regina Waldroup meet with Jerry Irvine to discuss the Target security breach here.

Corporate Secretary Identifies How CyberCrime Will Effect Boards in 2014 – January 8, 2014 
Jerry Irvine speaks to the viability of an organization after cyber crime here.

SC Magazine Discusses the Necessity for Cloud Security in this edition – January, 2014

Prescient’s Irvine and other CIOs share their thoughts on security in the cloud here.

What does the Internet of Things mean for IT Security in 2014? – January 9, 2014
Prescient’s CIO advises CSO-Online on several threats to watch here.

Will Cyber attacks increase in 2014? – January 9, 2014
The Daily Herald asks Jerry Irvine to share his insights here. 

Jerry Irvine featured in InformationWeek – December 23, 2013
Jerry Irvine talks about security challenges for BYOD and the cloud in 2014. Read the story here.

Jerry Irvine featured in FutureStructure – December 22, 2013
Prescient CIO Jerry Irvine discusses the security issues that go along with the Internet of Things. Read the story here.

Jerry Irvine featured in Insurance Journal – December 21, 2013
Jerry Irvine sheds insight into data security in the wake of the Target breach. Read the story here.

Jerry Irvine featured in the Baltimore Sun – December 20, 2013
Prescient CIO Jerry Irvine talks about the patience, cunning behind the Target data breach. Read the story here.

Jerry Irvine featured in the Chicago Tribune – December 20, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the story here.

Jerry Irvine featured on CRN.com – December 19, 2013
Prescient CIO Jerry Irvine comments on data security in light of the Target data breach. Read the storyhere.

Jerry Irvine featured on WBBM-AM – December 19, 2013
Listen to Prescient CIO Jerry Irvine discuss the recent Target data breach. Advance to 2:14 to hear theinterview.

Jerry Irvine featured in Mobile Security Zone – December 16, 2013
Jerry Irvine provided insight on 2014 cloud security and BYOD trends and predictions. Read more here.

Jerry Irvine featured in The Communique – December 1, 2013

CIO Jerry Irvine discusses mobile device security for employees. Read the article here.

Jerry Irvine featured in Forbes – November 26, 2013
CIO Jerry Irvine discusses Cyber Monday security issues with Hollie Slade. Read the article here.

Jerry Irvine featured in The Enterprising CIO – November 8, 2013
In an interview with Minda Zetlin, Jerry Irvine provided insight on cloud security. Read more here.

Jerry Irvine featured in SC Magazine – November 1, 2013

CIO Jerry Irvine discusses mobile payment security with Stephen Lawton. Read the article here.

Jerry Irvine featured in Government Technology – October 30, 2013
Jerry Irvine discusses new cyber threats from hacking groups. Read the article here.

Jerry Irvine featured in Government Technology – October 29, 2013
Jerry offers tips and tricks to help agencies protect sensitive data. Read the article here.

Jerry Irvine featured on First Business – October 28, 2013
Jerry spoke with Bill Moller on the dangers of Ransomware. View the segment here.

Jerry Irvine featured in Forbes – October 22, 2013
In an interview with Scott Koegler, Jerry Irvine provided insight on security issues with Google Glass and wearable technologies. Read more here.

Jerry Irvine featured in the Wall Street Journal – October 21, 2013
Jerry Irvine discusses why individual hackers are no longer a threat and why we need to be worried about organized groups. Read the article here.

Jerry Irvine featured in Corp! Magazine – October 17, 2013
CIO, Jerry Irvine covers what, where and when to cloud. Read the article here.

Jerry Irvine featured on SmallBusinessComputing.com – October 10, 2013
Jerry Irvine shares his thoughts on how SMBs are/are not using the cloud for disaster recovery (DR). Read the article here.

Jerry Irvine featured in eHow Tech Podcast – October 1, 2013
Jerry Irvine discusses the iPhone’s Touch ID fingerprint reader security. Listen to the podcast here.

Jerry Irvine featured in FierceCIO – September 29, 2013
The ability to build and communicate a credible business case is obviously necessary to the CIO. Read the full article here.

Jerry Irvine featured in Government Product News – September 18, 2013
Jerry Irvine discusses top threats to local government’s information security. Read the interview here.

Jerry Irvine featured on CreditCards.com – September 17, 2013
The security of mobile swiping systems can vary. Inputting credit card information to a smartphone or tablet can present troubling security risks. View interview here.

Jerry Irvine featured in American City and County – September 17, 2013
In an interview with Michael Keating, Irvine gives insight on the necessity of data recovery after a disaster. Check out the article here.

Jerry Irvine featured on ThomasNet – September 17, 2013
Jerry Irvine talks about disaster recovery best practices for manufacturer. Read the story here.

Jerry Irvine featured on First Business News – September 12, 2013
In a TV interview, Jerry Irvine provided insight on the new iPhone fingerprint technology. View the video.

Jerry Irvine featured in IT Manager Daily – September 17, 2013
What are the hottest IT certifications today? Read the story here.

Jerry Irvine featured on Kiplinger – September 10, 2013
Simple steps to take to reduce your risk of becoming a victim of identity theft and financial fraud with Jerry Irvine. Article here.

Jerry Irvine featured in Security Magazine – September 1, 2013
Jerry Irvine the five top security questions about iPhone biometric authentication. Article here.

Jerry Irvine featured in eWeek – August 25, 2013

Irvine highlights the future of the Internet of Things, but also highlights the dangers. Read the full article here.

Jerry Irvine featured in InformationWeek – August 22, 2013

Irvine explains potential threats posed to government organizations by Google Glass. View his article here.

Jerry Irvine featured in Workforce Management – August 21, 2013
Jerry Irvine helps define the company’s role in tech support for contingent workers. Read the interview here.

Jerry Irvine featured in Baseline – August 16, 2013

Organizations are encountering new security risks as Google Glass goes mainstream because the device can be used to secretly capture confidential data. Read the full article here.

Jerry Irvine featured in Human Resource Executive Online – August 7, 2013
In an interview with Kecia Ball, Irvine gives insight on the growing gap in IT skills. Article here.

Jerry Irvine featured in The Chicago Tribune – August 4, 2013
Google Glass has been generating headlines, but what are the cybersecurity vulnerabilities? Irvine provides his expertise in a bylined article. Article here.

Anthony Pettenon featured in The Chicago Tribune – August 4, 2013
What’s it like to be a Google Glass Explorer? Anthony Pettenon provides a glimpse of his experience in a bylined article. Article here.

Jerry Irvine featured in SC Magazine – August 1, 2013
Jerry Irvine discusses the skills in demand for ERP system administrators. Read the full article here.

Prescient Solutions featured in Bankrate – July 18, 2013
Hackers are always on the hunt for personally identifiable information. Read Jerry Irvine’s tips for setting secure online passwords. Article here.

Jerry Irvine featured in The Wall Street Journal –  June 26, 2013
In an interview with Gregory Millman, Irvine explains why varying your passwords may save you from a cybersecurity threat. Article here.

Jerry Irvine featured in American City & County – June 25, 2013

Learn more about the top local government IT security trends for the second half of 2013. Article here.

Prescient Solutions featured in Chicago Sun-Times – June 14, 2013
Read more about how Prescient Solutions keeps Chicago businesses secure and why we are up for an American Technology Award. Article here.

Jerry Irvine featured in Fox Business – June 12, 2013
Traveling poses new opportunities for identity theft. CIO Jerry Irvine shared the unique threats to your personal data while traveling. Read the article here.

Jerry Irvine featured on CFO.com – June 03, 2013
This webcast features a distinguished panel of experts who will chart the proliferation in the use of business applications, and explain both the opportunities and risks of shedding the related management responsibilities to third parties. View webcast information here.

Jerry Irvine featured in SC magazine – June 1, 2013
In his opinion column, Irvine explains why securing mobile devices along is not enough. Read morehere.

Jerry Irvine included in Forbes Insights – June 2013
Forbes Insights conducted a survey with executives in order to gain their insight on mobile for business. Irvine offers his expertise here.

E.U.’s Broad Cyber Security Strategy Faces A Long Path To Approval – May 19, 2013
CIO Jerry Irvine commented on the EU’s new cybersecurity framework in Business Insurance. Read the article here.

Jerry Irvine featured on Fox Chicago – May 14, 2013
In an interview with Anna Davlantes, Jerry Irvine provided the dos and don’ts of protecting information online. Watch the video here.

Shedding Light on Bring Your Own Cloud – May 9, 2013
A plethora of unauthorized apps is creating havoc for IT departments everywhere. CIO Jerry Irvine offers ways to gain back control of cloud sprawl. Read more here.

Google’s Inactive Account Manager Heightens Enterprise Awareness for Securing Data – May 7, 2013
In an interview with TechRepublic, Jerry Irvine explained what companies need to know about Google’s latest feature. Read more here.

Jerry Irvine featured in USA Today – May 6, 2013
In an interview with Byron Acohido, Jerry Irvine provided insight on the planned hacking attack on banks and credit unions. Read more here.

Help Combat Intellectual Property Theft – May 2, 2013
The bring your own device movement is sweeping through corporations, increasing productivity and collaboration. But figuring out how to secure devices remains a top concern for HR departments. Jerry Irvine provides tips for preventing IP theft here.

Specialized IT Project Managers Are in Demand – May 1, 2013
In his ongoing column in SC Magazine, Jerry Irvine provided insight on the skills needed to become an IT project manager. Read more here.

The Security Certification Debate Continues – April 25, 2013
The value of security certifications for IT professionals has long been debated. Jerry Irvine shares his thoughts on why they still add value. Read more here.

Jerry Irvine featured on ABC 7 Chicago – April 23, 2013
In an interview with Ben Bradley from ABC, Jerry Irvine discussed the hacking of The Associated Press’ Twitter account. Watch the interview here.

Jerry Irvine featured on CFO webcast – April 22, 2013
In a webcast with CFO magazine, Jerry Irvine provided expertise on the protocols companies should be implementing to address shadow IT risks. Download the webcast here.

How Valuable Are Security Certifications Today? – April 1, 2013
In an article by  Lauren Gibbons Paul, Jerry Irvine provided his perspective on the value of certifications for IT professionals. Read more here.

Hackers Up the Ante for Small-Business Data Security – March 14, 2013
In an interview with Elaine Pofeldt, Jerry Irvine provided guidance on how small businessess can protect themselves from hackers. Read more here.

Why You Should Consider an IT Audit – March 7, 2013
In an interview with Sheryl Nance-Nash, Jerry Irvine explained that personally-identifiable information is becoming a huge target for hackers. Read more here.

Cloud Computing: Where Are We Now? – March 6, 2013
In an interview with Michael McDermott, Jerry Irvine provided expertise on how the cloud is impacting small businesses. Read more here.

Hot Security Skills of 2013 – March 3, 2013
In an interview with CSO Magazine, Jerry Irvine provided expertise on the skills needed to become a CSO. Read more here.

Fear Factor: Why Security Is Still the Cloud’s Biggest Hurdle – Feb. 25, 2013
In an interview with CRN, Jerry Irvine provided expertise on how organizations can protect their data while operating in the cloud. Read more here.

Threat of the Week: What the President’s Cyber Security Directive Means to You – Feb. 15, 2013
In an interview with Credit Union Times, Jerry Irvine offered his perspective on President Obama’s executive order on cybersecurity. Read more here.

Banks Fear Liability from Obama Cybersecurity Plan – Feb. 12, 2013
In an interview with Evan Weinberger, Jerry Irvine offered insight on how banks might be impacted by President Obama’s executive order on cybersecurity. Read more here.

Are You Minimizing Your Travel Risks – Feb. 1, 2013
In an interview with Global Traveler, Jerry Irvine provided expertise on how business travelers can keep their information safe while overseas. Read more here.

Jerry Irvine featured in SC Magazine – Feb. 1, 2013
In an ongoing SC Magazine column, the Prescient CIO explained why automation systems professionals are in demand. Read more here.

Jerry Irvine featured on NBCnews.com – Jan. 30, 2013
In an article by Sue Marquette Poremba, Jerry Irvine provided tips for protecting smartphones from malicious applications. Read more here.

How to Lock Down Your Android and Lock Out Malware – Jan. 30, 2013
In a TechNewsDaily article, Jerry Irvine offered insight on how to protect a mobile device from malicious applications. Read more here.

Three Tips for Keeping Your Personal Information Safe – Jan. 29, 2013
In a blog post featured on Stay Safe Online, Jerry Irvine offered insight on easy ways you can protect personal information online. Read more here.

IT’s Top Budget Busters – Jan. 22, 2013
In a bylined article on FierceCIO.com, Prescient CIO Jerry Irvine detailed why so many companies outspend their IT budgets. Read more here.

What’s on Your Smartphone? – Jan. 14, 2013
In an article by Robert McGarvey, Jerry Irvine explained why all is not lost if you’ve misplaced your mobile device. Read more here.

Jettisoning Java: Damned If You Do, Damned If You Don’t – Jan. 12, 2013
Our CIO Jerry Irvine provided guidance to businesses utilizing Java amid cybersecurity concerns to the platform. Read more here.

Three Biggest Myths About Business Continuity Planning – Jan. 11, 2013
Prescient’s blog post about disaster recovery and business continuity planning was featured by Disaster Recovery Journal. Read more here.

Jerry Irvine featured on First Business – Jan. 9, 2013
In a TV interview with Bill Moller, CIO Jerry Irvine provided insight on the strengths and weaknesses of antivirus solutions. Watch the interview here.

7 Deadly Sins of Cloud Computing – Jan. 2, 2013
Our CIO Jerry Irvine provided expertise on mistakes companies make when switching to cloud-based technology. Read more here. 

How to Protect Yourself While Using Shopping Apps – Dec. 31, 2012
In an article by Katie Gatto, Jerry Irvine explained why shopping on your smartphone can be hazardous to your personal information. Read more here.

How to Prepare Your VoIP System for Disaster – Dec. 17, 2012
In an interview with Cindy Waxer, Jerry Irvine shares best practices for utilizing a VoIP system to maintain business continuity. Read more here.

Top Five IT Budget Busters and How to Avoid Them – Dec. 13, 2012
In an interview with Robin Miller, Jerry Irvine provided guidance for organizations setting their IT budgets. Watch the interview here.

When In China, Don’t Leave Your Laptop Alone – Dec. 4, 2012
In an interview with Bob Violino from InfoWorld, Jerry Irvine explained the challenges of data protection while traveling overseas. Read more here.

Skills in Demand: System Engineers – Dec. 3, 2012
In an SC Magazine article, Jerry Irvine detailed the skills employers are looking for when hiring a system engineer. Read more here.

Prescient CIO featured in MarketWatch – Nov. 29, 2012
In an interview with MarketWatch’s Rex Crum, Jerry Irvine provided tips for protecting data while shopping on your smartphone. Read more here.

Why More SMBs Are Reaching the Virtualization Tipping Point – Nov. 27, 2012
Our CIO Jerry Irvine detailed the value of virtualization for businesses with physical servers. Read more here.

2013 Small Business Trends: Known Unknowns Ahead – Nov. 27, 2012
Jerry Irvine provided insight on IT hiring trends on Monster.com. Read more here.

Cyber Monday 2012 Sales Require Security Awareness – Nov. 26, 2012
In an interview with ABC7’s Leah Hope, CIO Jerry Irvine provided tips on how to keep your data safe while shopping online. Watch the interview here.

Jerry Irvine featured on ABC7 Chicago – Nov. 26, 2012
In an interview with Judy Hsu of ABC7, Jerry Irvine provided insight on how consumers can protect themselves while shopping online. Watch the full interview here.

Prescient CIO Foresees IT Challenges Ahead – Nov. 16, 2012
Jerry Irvine provided insight on the issues facing IT departments in Enterprise Efficiency. Read more here.

Five Steps to Prepare Employees, Business for Natural Disasters – Nov. 9, 2012
Jerry Irvine stressed the importance of developing a business continuity plan to properly prepare for business interruption in BenefitsPro. Read more here.

How to Become a Security Analyst – Nov. 5, 2012
In an article by Ian Palmer of Infosec Institute, CIO Jerry Irvine provided guidance on what IT companies look for when hiring a security analyst. Read more here.

Hurricane Sandy Tests Business Continuity, Disaster Recovery – Oct. 31, 2012
In an interview with SC Magazine, Prescient Solutions’ Jerry Irvine explained that business continuity plans are important differentiators in determining how quickly organizations recover from a disaster. Read more here.

The State Of ETL: Extract, Transform And Load Technology – Oct. 8, 2012
In a Data Informed article by Alan Earls, Jerry Irvine detailed how businesses of all sizes are using ETL technology. As Irvine explained, it’s not just for data warehousing. Read more here.

Jerry Irvine featured on First Business – Sept. 18, 2012
In an interview with Bill Moller, Irvine provided insight on the emerging threat that hackers pose to smartphones. Watch the full interview here.

Mobile CRM’s Tricky Back End – Sept. 11, 2012
In a CRM Buyer article, Jerry Irvine provided best practices for organizations integrating mobile CRM into their business. Read more here.

Patient Hackers Pose Growing Threat To Insurance Companies Large And Small – Sept. 4, 2012
In an article by Anthony O’Donnell, Jerry Irvine provided insight on advanced persistent threats. Read more here.

Jerry Irvine featured in Global Finance – Sept. 1, 2012
In an article by Paula Green, our CIO provided insight on the state of cyber risk. Read more here.

Prescient Solutions featured on Interest.com – Aug. 22, 2012
In an article by Rich Mintzer, Jerry Irvine provided insight on email scams and how to protect your identity online. Here.

The Growing Pains of BYOD – Aug. 20, 2012

In an article authored by our CIO, Jerry Irvine discussed the security challenges of implementing a BYOD policy. Read the full article here.

Finding New Infrastructure Solutions – Aug. 20, 2012
In an article in Homeland Security Today, Jerry Irvine provided insight on the latest trends in viruses and cybersecurity. Read the full article here.

Jerry Irvine featured on HP Input/Output – Aug. 8, 2012
In an article by Lisa Vaas, Irvine discussed the job market for cybersecurity professionals and what companies look for when hiring for InfoSec positions. Read more here.

Prescient Solutions featured on Tech Talk – Aug. 5, 2012
In an interview with Craig Peterson of Tech Talk radio, Jerry Irvine discussed the cybersecurity risks associated with the 2012 Summer Olympics and how hacking has changed over time. Listen to the full interview here.

IT Skills in Demand – Aug. 1, 2012
In ongoing SC Magazine column, Jerry Irvine provided insight on the high demand for business continuity and disaster recovery specialists. Read more here.

Jerry Irvine interviewed on NBC Chicago – July 9, 2012

In an interview with NBC Chicago, Irvine discussed the potential implications of the DNS Malware virus and provides best practices for avoiding a virus. Watch here.

Prescient Solutions featured in SC Magazine – July 2, 2012
In an article by Alan Earls, Jerry Irvine provided tips on how companies can improve their data protection and information security. Here.

Prescient Solutions featured on CNBC – May 29, 2012
In an article by CNBC reporter Mark Koba, Jerry Irvine shared his thoughts on the current state of the tech worker shortage. Article here.

Jerry Irvine featured on About.com – May 18, 2012
In an article written by our CIO, Irvine provided an overview of CISPA and covered all sides of the debate. Read more here.

Prescient Solutions featured on ABC – May 17, 2012
In an interview on WLS-TV, Jerry Irvine detailed that hacking groups view the NATO Summit in Chicago as a platform to gain publicity and notoriety. Watch here.

Irvine provides Insight on CISPA – May 17, 2012
In an interview with The Tech Guy, Jerry Irvine explained why he’s in favor of CISPA and feels it’s the best option available. Learn more about CISPA and read the full interview here.

Prescient CIO Featured in Crain’s Chicago Business – May 3, 2012
In an article by Crain’s Chicago reporter Danny Ecker, Irvine explained that everyone is at risk for attack during the NATO Summit. Article here.

Jerry Irvine featured in SC Magazine – May 1, 2012
CIO Jerry Irvine discussed IT skills currently in demand by organizations. Read his article here.

Prescient Solutions on WGN Radio – March 31, 2012
In an interview with WGN Radio’s Bill Moller, Jerry Irvine discussed cyber security and the hacking group Anonymous. Link not available.

Prescient CIO in SC Magazine – March 3, 2012
In an SC Magazine article by Jim Romero, Irvine gave his thoughts on the growing trend of hacktivism here.

Irvine Provides Insight to TechNewsWorld – Feb. 28, 2012
In an article titled “Are Security Vendors Living in Glass Houses?” Prescient CIO Jerry Irvine emphasized the importance of disclosing data breaches to avoid placing customers at risk. Read the TechNewsWorld article here.

Debate over Cyberspace Legislation – Feb. 15, 2012
In an AOL Government article discussing proposed cybersecurity legislation, Jerry Irvine advocated for more transparency among all organizations and cautioned that the bill might place an inordinate burden on the private sector. Learn more about the legislation and read Irvine’s comments here.

Prescient CIO Quoted in New York Times – Feb. 14, 2012

One year after hacking collective Anonymous penetrated the website of Combined Systems, reporter Nicole Perlroth sought guidance on how organizations can decrease the likelihood of an attack. Jerry Irvine advocated for companies allocating more financial resources to protecting their IT. View the full article here.

Irvine Featured Guest on FOX Chicago News – Feb. 13, 2012
Appearing on “Good Day Chicago” with Corey McPherrin and Anna Davlantes, Irvine provided tips to help online consumers protect themselves. Refraining from using email addresses as user ids and not allowing websites to save credit card information were among the points that Irvine outlined. Watch the segment here.

New York Times Article Features Irvine – Feb. 10, 2012
In an article by New York Times reporter Nicole Perlroth, Irvine analyzed an attack on the C.I.A. website by Anonymous and the potential of future occurrences. Read the full article here.

Hacks on VeriSign System Brings Concerns for Security Industry– Feb. 3, 2012
Two years following the incident, VeriSign, an infrastructure company, acknowledged that their system has been compromised by an attack in 2010. Irvine was quoted in the E-Commerce Times regarding the lack of confidence that users have in the security of their data online. View the article by reporter Erika Morphy here.

Irvine Discusses Cloud Technology in PC Today – Feb. 1, 2012
In an article titled “Cloud Critics”, Irvine offered his expertise for businesses contemplating the use of cloud technology and cautioned against putting their entire application system on cloud. Read the article and Irvine’s guidance here.

Interview on WGN Radio – Jan. 28, 2012
In honor of Data Privacy Day, an international celebration aimed at raising awareness about piracy and best practices, Irvine was interviewed on WGN Radio by reporter Bill Moller. Listen to the interview here.

Data Privacy Day Interview on WTMJ-AM – Jan. 28, 2012
Appearing on WTMJ-AM in Milwaukee with host Michelle Fiore, Irvine conversed about Data Privacy Day. No hyperlink of the interview is currently available.

Data Privacy Day Interview on First Business – Jan. 27, 2012
In advance of Data Privacy Day, Irvine was featured in an interview with Bill Moller. Watch the full episode here.

New York Times Features Irvine’s Recommendations for Online Consumers – Jan. 17, 2012
After a security breach at Zappos compromised their massive customer database, Irvine provided advice to the New York Times on how consumers can better protect themselves. View the full articlehere.

Irvine Delivers Expertise in New York Times Article – Dec. 25, 2011
Following a highly publicized attack by hackers, Irvine cautioned that all websites have some level of vulnerability in a New York Times article titled “Hackers Breach the Web Site of Stratfor Global Intelligence.” See the full article here.

IT Hiring Trends in CIO – Dec. 1, 2011
“Six Hot IT Jobs That Will Pay Well in 2012” included quotes from Irvine regarding recent software developments and an increase in IT jobs within the marketplace. The CIO article can be found here.

Irvine Featured in PC Today – Nov. 1, 2011
The Prescient Solutions CIO provided his recommendations for a computer security system and detailed the costs associated with incorporating the infrastructure. Read the entire PC Today article here.

Analysis of the IT Job Market in Computerworld – Oct. 5, 2011

In “IT Industry Shrinks as Employer in Past Decade”, Irvine provides perspective on the current state of hiring in the IT industry and the challenges of finding versatile candidates. Read the Computerworld article here.

Irvine Quoted in CRN Article – Sept. 22, 2011
In an article titled “Five Ways to Get a Piece of the Cloud Market”, Irvine advised on best practices for securing data while incorporating cloud technology. View the full CRN article by Jennifer Bosavagehere.

Cyber Security Interview on First Business – July 26, 2011
CIO Jerry Irvine, a member of the National Cyber Security Task Force, was a featured guest on an episode of First Business with Bill Moller. Irvine provided his expertise on cyber security. Watch the full episode here.

/*
*/