Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...
Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations   It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why?  Medical data is worth big bucks — up to...
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption   Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories.  They simply take all our information and re-sell it making huge...
Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data   Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed.  Well, these under $20 devices can be connected in computers...
Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step

Cyber Cold War Right on Our Door Step   Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Are your Apps Leaking? Unpatched Vulnerabilities Lead to Leaking Apps

Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores.  Additionally, businesses depend on older software applications are at a great risk...