Cyber Sentinel Chad Barr Protects CRRA & CMLS’ Computers, Network From Internet Attacks

By Elizabeth Donahue Chad Barr, CMLS’ IT Manager, is known fondly among associates as “the guy with the alphabet after his name.” That’s because Barr has earned such professional certifications as CISSP® (Certified Information System Security Professional), TICSA (TrueSecure ICSA, International Computer Security Association, Certified Security Associate), (CEH ) Certified Ethical Hacker, MCP (Microsoft Certified…

Chad Barr Earns Top Information Security Credential

Charlotte, NC., April 8th 2007 – Chad M. Barr has earned the designation of Certified Information System Systems Security Professional (CISSP®), the premier professional certification for information security experts. The CISSP is awarded by the International Information Systems Security Certification Consortium, Inc. (ISC)² ®, a non-profit consortium dedicated to educating and certifying information security professionals…

|

Staying Safe on Social Networking Sites

From the Desk of Chad M. Barr, CISSP, CISA The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the…

|

Erasing Information and Disposal of Media

From the Desk of Chad M. Barr How can I be sure files are erased? Data can be stored electronically in multiple formats and locations. Data sometimes includes sensitive documents or possibly data containing personally identifiable information such as a social security number, credit card information, or health related information. For example, the initial information…

|

How Anonymous Are You?

From the Desk of  Chad M. Barr, CISSP, CISA What information is collected? When you visit a web site, a certain amount of information is automatically sent to the site. This information may include the following: IP address – Each computer on the internet is assigned a specific, unique IP (internet protocol) address. Your computer…

|

Why Cyber Security is Important

From the Desk of Chad M. Barr, CISSP, CISA What is cyber security? It seems that everything relies on computers and the Internet now — communication (email, cell phones), entertainment (digital cable, MP3’s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much…

Chad Barr Named CRRA Information Technology Manager

Charlotte, North Carolina, Dec. 14, 2004 – The Charlotte Regional Realtor® Association (CRRA) announces Chad Barr as their new information technology manager. Barr’s duties include computer networking, evaluation and assessment of the associations’ technological needs and network security. “We are very pleased to have Chad at the association,” says Steve Byrd, vice president and chief…

Who’s Who Historical Society Recognizes Chad Barr

Charlotte, NC., Oct 25th , 2001 – Who’s Who Historical Society recognizes Chad Barr as one of it’s newest members to appear in the 2001/2002 edition of International WHO’S WHO of Information Technology, having demonstrated exemplary achievement and distinguished contributions to the business community. Chad is no stranger to the Who’s Who Historical Society; he…