IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories.  With all the stories about the Coronavirus that...
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser.  Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services.  Vetting of these services and restrictions on what data they can access is the primary reason.  Cybercriminals...
Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession.  And they carry them everywhere. Yes, I am talking about their cellphones.  On these devices, they can download 1000’s of apps. These apps allow them to create...
Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world.  Even the most prepared organization have found themselves...
The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...