2019 has come to an end and we are now about a week into a new year and new decade. Since all the festivities have finished and most of our clients are back at work focused on 2020, I wanted to take some time to look back at the past year to reflect on the…

Read More

T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…

Read More

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…

Read More

In a profession growing at a rate of 36.5%, according to the U.S. News and World Report, there seems to be plenty of jobs opening in the Information Security sector. While the job market is booming in this field, securing a position isn’t as easy as finding one. As a co-author to a new book, Co-founder…

Read More

Hackers have breached the security of Riot Games, makers of one of the most widely played online games worldwide, League of Legends. The company notified users that their North American servers had been hacked via an email sent Wednesday.

Read More

At the end of March the Inspector General released a report on the effects of BYOD (bring your own device) on the U.S. military. The findings were a little worrying as the Military lacked some of the basic guidelines that many business have in place.       The following points are from the reports findings: Mobile devices were…

Read More

As companies now face threats from every angle—foreign, national, and internal—there seems to be a “who, me?” attitude when it comes to security. Many companies handle security incidents in a hush-hush manner, quietly sweeping these all-too-common occurrences under the rug, hidden from the public.

Read More