top of page
Search
Jan 22, 20183 min read
Password Stealing Apps With Over A Million Downloads Found On Google Play Store
Even after so many efforts by Google like launching bug bounty program and preventing apps from using Android accessibility services, malici
25 views0 comments
Jan 19, 20182 min read
The Importance of Information Security Training
It's important to ensure that personnel have information security training on how to securely process sensitive data, and how to securel
65 views0 comments
Jan 12, 20182 min read
Documented Cybersecurity Policies and Procedures Is Half the Battle
The objective of implementing policies and procedures is to help organizations stay consistent and hold employees accountable. Having docume
44 views0 comments
Dec 7, 20172 min read
Best Practices: Social Media Accounts
Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
50 views0 comments
Dec 6, 20172 min read
Tips to Protect Customer Data
We provide a few simple tips to protect customer data and personally identifiable information (PII) that don't involve typical cybersecu
57 views0 comments
Nov 29, 20172 min read
What are Federal Information Processing Standards?
Federal Information Processing Standards (FIPS) are standards and guidelines issued by the National Institute of Standards and Technology (N
29 views0 comments
Nov 22, 20172 min read
Is my computer infected with malware?
Knowing what kind of threats are out there is an important first step in protecting your device. Threats can come from a variety sources: th
37 views0 comments
Nov 8, 20172 min read
Data Recovery Prevention and Protection
Data loss can happen to anyone. For many businesses and organizations, data is the heart and center of daily operations. We've discussed
54 views0 comments
Oct 23, 20174 min read
Everything you need to know about KRACK, the Wi-Fi security flaw.
A newly revealed Wi-Fi weak spot puts just about every device at risk, from your work computer to the phone in your hand and the laptop you
32 views0 comments
Oct 19, 20175 min read
Survey Reveals Most US Workers Misunderstand Cybersecurity
A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tip
36 views0 comments
Oct 18, 20172 min read
Are You FERPA Compliant?
We continue our compliance series with a focus on The Family Educational Rights and Privacy Act (FERPA).
127 views0 comments
Oct 10, 20172 min read
What is compliance?
We discuss what compliance is, and various regulations that may affect your business.
72 views0 comments
Oct 4, 20172 min read
Cybersecurity Best Practice Series: Website Navigation
We finish off our cybersecurity mini series with a round up of tips on how to surf the net safe and secure.
55 views0 comments
Oct 2, 20172 min read
5 Cybersecurity Facts and Statistics For 2017
These top level numbers summarize the cybersecurity industry over the past year and indicate what's in store for the next five years.
112 views0 comments
Sep 28, 20173 min read
Cybersecurity Best Practice Series: Phone Scams
In this post we identify and discuss various phone call and texting scams for our ongoing cybersecurity best practices mini series.
55 views0 comments
Sep 22, 20173 min read
Cybersecurity Best Practice Series: Phishing and Email Scams
The next topic in our best practices series will focus on email scams/phishing.
109 views0 comments
Sep 21, 20172 min read
Equifax has been tweeting out a phishing site
The credit agency's Twitter account tweeted links on Wednesday to a fake site pretending to be Equifax.
34 views0 comments
Sep 20, 20177 min read
The Future of Cyber Security Threats and What's to Come
A new study from The Internet Society shows what influencers around the world expect (and fear) about the future social, business and regula
53 views0 comments
Sep 18, 20173 min read
Bluetooth Malware Attack Puts Smartphones at Risk
Devices with Bluetooth signals are at risk of a malware attack.
35 views0 comments
bottom of page