Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality Regulatory compliance.  We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight.  Why? It is complicated and expensive and they...
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring?  Did you do your due diligence?  I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince.    ...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...