On February 5, 2021, a hacker remotely accessed a Florida city’s water treatment network and increased the level of sodium hydroxide (lye) in the water supply.

The attack on the City of Oldsmar’s water supply system is a stark reminder that critical infrastructure organizations must prepare for and defend against similar attacks.

The incident underscores the need for utilities, oil and gas providers, and other owners of critical infrastructure to monitor their operational technologies (OT) and industrial control systems (ICS), and secure remote access as part of a robust security program.

It is not a matter of “will it happen?”…

This was a Twitter thread, so it may be some time before I get it looking like a proper story. This interview of Dr. Jim Loehr with @tferriss reminded me of one reason I am so much better when I write every morning.

We all have a constant companion: our private voice, also called the “inner critic.”

(Originally published on December 31, 2011. I think most of it holds up, save some of the references).

It is the time of year when we aspire to change just about everything in our lives.

If you are charting a course for the next year, consider listening to the “Willpower Science” episode of The People’s Pharmacy, The Graedons’ guest is Kelly McGonigal of Stanford University and author of The Willpower Instinct: How Self-Control Works, Why it Matters, and What You Can Do to Get More of It.

I know, what a basic and obvious proposition. Of course the body doesn’t “work” unless you’re breathing. And isn’t breathing- something we do automatically without being aware it’s happening- one of those habits we should all develop? And if it’s working (I am still here, right?), why give breathing a moment’s thought, especially given all the things that require attention?

Here’s why: the way we breathe can help regulate the body’s automatic responses, and provide more space for thinking and problem-solving.

Let me briefly explain, with the help of Breath: The New Science of a Lost Art by James Nestor.

We all want to get better in our various roles. Or at least that’s where I start in these pieces. If you believe you’re fully formed and have nothing new to learn, then by all means keep doing what you are doing, telling everyone within earshot how busy you are, and dropping the names of people I don’t know.

And getting better means improving my behavior, both those conscious decisions I make (judgments), and those automatic decisions I may make without being aware (habits).

Improving my judgment and habits is the process through which I learn new things and develop…

Organizations are now familiar with the threats to information technology (IT) systems posed by cyber threats, malicious insiders, and human error. Hardware and software connected to IT networks and the internet are increasingly utilized to help monitor and manage industrial and manufacturing assets and facilities. As a result, this operational technology (OT) puts physical infrastructure and facilities at risk for attack and compromise.

The National Security Agency (NSA) and the Cybersecurity & Infrastructure Security Agency (CISA) recently issued a Cybersecurity Advisory highlighting the threats that malicious cyberactivity poses to critical infrastructure (CI), including commercial facilities, communications, energy, financial services, information…

Yes, That’s a VGA-HDMI Adapter.

This is more a journal of the last couple of weeks than a piece with any sort of theme, but perhaps you find some tips or ideas for how get more accustomed to living and working remotely.

The Bigger Picture: What’s Going to Change?

Call it the “new normal,” or adopt whatever buzzword you like, but the fact that Zoom is now a household word and boasts a stock value of more than all U.S. Airlines combined is significant.

Consider putting some attention and time to the proposition of what work will look like going forward. …

Consider what additional risks you may face in the event you are working without a net(work), or at least in a different environment.

  1. Use strong, unique passwords (preferably passphrases) for all your computer devices and online accounts. Consider a password manager.
  2. Set your devices, (including your smartphone), to lock after a short time, and require a passcode to unlock them.
  3. Patch and update all your software, applications, and operating systems regularly.
  4. Enable and employ multi-factor authentication wherever possible.
  5. Use a virtual private network (VPN) to access your employer’s network, and if you have to use public Wi-Fi.
  6. Don’t save documents…

(I wrote this with my colleagues Amy Hanna Keeney, and William P. “Billy” Gaudet ).

On March 10, a putative class action complaint was filed by Hector Fuentes in the U.S. District Court of California against Sunshine Behavioral Group, LLC, (Sunshine) in connection with a September 2019 data breach that resulted in the exposure and exfiltration of the sensitive personal and medical data of approximately 3,500 patients. Among other claims, Mr. Fuentes alleges a violation of the California Consumer Protection Act (CCPA).

Notably, the CCPA’s private right of action only allows individuals to bring suit if their personal information is…

On December 20, 2018 the Agricultural Improvement Act of 2018 (the “2018 Farm Bill”) became effective and legalized hemp production nationwide, subject to stringent federal and state licensing and regulation.

The following is a brief overview of the status of hemp (also called “commercial hemp” or “industrial hemp”) farming and regulation in the Southeastern United States following the 2018 Farm Bill and previous legislation.


The terms “hemp” (which has non-drug connotations and uses) and “marijuana” (no further explanation necessary) describe the same plant genus: cannabis. The difference between the two is generally based on the relative amount of tetrahydrocannabinol (THC)…

Jack Pringle

Litigator, appellate advocate, regulatory and information technology attorney @adamsandreese, Information Privacy Professional (CIPP-US)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store