Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe

Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe

Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe   Apple designs their computers with a security-first mindset but that does not  mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Liability belongs to You: Misconfigured Clouds and Security

Liability belongs to You: Misconfigured Clouds and Security

Liability belongs to You: Misconfigured Clouds and Security Companies that were sold on Cloud Services as a cost-effective solution to maintaining a corporate server with specialized software were ill-equipped to understand all of the technological security...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible.  WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services.  Vetting of these services and restrictions on what data they can access is the primary reason.  Cybercriminals...