Time to Invest in Cybersecurity

Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack.  With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime.  Much...
Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data.  I constantly have to explain to...
The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring?  Did you do your due diligence?  I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince.    ...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...