Donald Korinchak, MBA, PMP, CISSP, CASP, ITILv3

Donald Korinchak is a Cybersecurity Professional in the Washington DC area. Donald holds an MBA from the University of Pittsburgh Katz School of Business. Donald is considered a thought leader in business, leadership, and cybersecurity issues.
The Role of AI in Cybersecurity

The Role of AI in Cybersecurity

While AI is a relatively new set of technologies, the development of working solutions can seem challenging. Let’s review some of the key concepts...

VoIP Considerations

VoIP Considerations

Open-Source vs. Closed-Source Software, what’s Best for You?

Open-Source vs. Closed-Source Software, what’s Best for You?

Wireless Network Security Considerations

Wireless Network Security Considerations

RFID Security Vulnerabilites

RFID Security Vulnerabilites

5 Tips for a Safe Online Banking Experience

5 Tips for a Safe Online Banking Experience

Adoption and Implementation of Virtualization Versus Physical Server Infrastructure

Adoption and Implementation of Virtualization Versus Physical Server Infrastructure

Best Practices to Secure Joomla Website

Best Practices to Secure Joomla Website

IPv4 DNS Vs. IPv6 DNS – Implementation and Predictions

IPv4 DNS Vs. IPv6 DNS – Implementation and Predictions

The IPv6 advantages of eliminating NAT and increased IP space, along with the proliferation of new connected IoT devices, will lead to...

The Effect of Cryptocurrency on the Banking System

The Effect of Cryptocurrency on the Banking System

The nature of cryptocurrencies puts it at odds with the traditional, centralized banking system.  Traditional banking systems rely...

New Cryptocurrency Regulation is Expected Soon

New Cryptocurrency Regulation is Expected Soon

How to Protect Your PC From Cryptojacking

How to Protect Your PC From Cryptojacking

Connecticut Leads The Country With Cybersecurity Initiatives

Connecticut Leads The Country With Cybersecurity Initiatives

Cybersecurity Trends Affecting Cybersecurity Stocks in 2022

Cybersecurity Trends Affecting Cybersecurity Stocks in 2022

What You Need to Know About Data Breaches

What You Need to Know About Data Breaches

5 Cybersecurity Issues You Need to be Aware Of

5 Cybersecurity Issues You Need to be Aware Of

What is Business Continuity Management?

What is Business Continuity Management?

Cybercrime rates surge during the COVID-19 pandemic

Cybercrime rates surge during the COVID-19 pandemic

The pandemic has changed every single area of our lives. It also holds true for the cyber side of it and with changes, come new dangers. 

Avoiding Cyber Threats When Dealing With Cryptocurrency

Avoiding Cyber Threats When Dealing With Cryptocurrency

Multi Factor Authentication (MFA)

Multi Factor Authentication (MFA)

No Featured Image

Top Managed IT Service Companies Share Insights Into NortonLifeLock & Avast Merger

No Featured Image

How to secure your computer from any virus threats?

Awesome Cybersecurity Facts

Awesome Cybersecurity Facts

A Step by Step Guide on how a Cybersecurity Risk Assessment is Performed

A Step by Step Guide on how a Cybersecurity Risk Assessment is Performed

Why hackers love patching

Why hackers love patching