Metrics Can Not Adequately Describe The Pain of Cybercrime

Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​ Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...

Did the Russians get Anywhere close to Hacking our 2016 Election?

Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.   The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business   If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...