The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration.    However, it must get set up correctly if you want to...
Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality Regulatory compliance.  We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight.  Why? It is complicated and expensive and they...

Zero-Day Browser Vulnerabilities

Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...