I am an IT professional, and I was recently the victim of a cyber-attack. There I was, standing in line at the cleaners, when I absentmindedly pulled out my phone to check my mobile banking app. As I opened the app and clicked on my account, I began to see transactions posting from a food […]
When your employees work from the office, their devices are all checking into your network, protected by a company grade firewall and their traffic is monitored from the time they log in until the time they shut down. Since most employees are now working from home, their devices are at the mercy of their home […]
The Cybersecurity Maturity Model Certification (CMMC) is redefining the cybersecurity requirements for all companies that work with the Department of Defense (DoD) in any capacity. This means that these companies will need to take the time to analyze their cybersecurity solution and compare it to the listed requirements for each certification level—if you don’t have […]
As more and more people begin working from home and utilizing new video conferencing software. Hackers are finding more and more ways to unsuspecting users into giving up user data. The latest platform has been the ever popular Zoom video conferencing tool. What is Zoom? Zoom is a video conferencing tool, that allows users to connect […]
“I miss my filing cabinet,” said no one ever. Document management isn’t always sexy. But it can be when you have the right system in place. Do you know where all of your documents are? It’s 2014, but some of us are still comfortable in our old ways of storing important information.
Facebook makes its security and privacy tools easier to find and alter in the wake of the Cambridge Analytica controversy. With all the news swirling around Cambridge Analytica, a political data firm that gained access to the private information of millions of Facebook users, many people are asking what information was collected and how they […]
Cyber Profiteering Every day we hear about companies or individuals being attacked through the very technologies they depend upon to operate their businesses or perform their personal online transactions. The techniques used by the ‘bad guys’ are sophisticated, organized, and very profitable and the risk of being caught or prosecuted is very small. Profiteering off […]