IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories.  With all the stories about the Coronavirus that...
The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality Regulatory compliance.  We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight.  Why? It is complicated and expensive and they...