Hannah George

I am Hannah George. I am positivity engager, tech blogger & coffee addict. I have a degree in Journalism and Modern Greek Studies from San Francisco State University. Writing is my passion and I write about tech news, trends, new apps and other tangentially related topics with a particular interest in wearables and exercise tech. When I am not writing, I go out biking on long trails. I live in San Francisco with my pet cat Sushi.
Hannah George

Job Outlook for CISA Professionals [Updated 2019]

Introduction The Certified Information System Auditor (CISA) certification is a globally recognized certification focusing on the audit, control and securit

Certified Information Systems Auditor (CISA): Exam Details and Processes [Updated 2019]

Introduction The Certified Information Systems Auditor (CISA) certification is for individuals who have interest in information systems auditing, control an

CISA study resources [Updated 2019]

The Certified Information Systems Auditor (CISA) is for security professionals with an interest in information systems (IS) auditing, control and security. I

How to Recover from A Business Email Compromise (BEC) Attack

Business email compromise (BEC) is one of the most devastating, and costly, cyber attacks of all time — it's estimated organizations lose over $130,000 per B

Understanding the Cloak & Dagger Attack: Overview & Tutorial

The Cloak and Dagger Attack is a method dealing with mismatched permission issues to access certain features on an Android device up to version 7.1.2. Certai

Computer Forensics: Civil Investigations

The Role of Computer Forensics in Civil Investigations The use of Computer forensics in civil investigations is a little different when compared to criminal

Computer Forensics: Criminal Investigations

Computer Forensics: An Inseparable Part of Criminal Investigations Computer Forensics has become an increasingly important element in cyber inquiry. Its use

E-Discovery and Computer Forensics – How are They Different?

Introduction to E-Discovery E-discovery is the procedure by which parties involved in a legal case collect, preserve, review and exchange information in elec

The Unattended Use of Stingray Devices Finally Gets Noticed

Police agencies around the United States are using the "Stingray," a powerful surveillance tool, which is even more potent than a spyware app made for wirel