Big Tech taking Advantage of Our Kids

Big Tech taking Advantage of Our Kids

Big Tech taking Advantage of Our Kids Technology costs money.  The sooner that everyone learns this the safer we will be.  There is no way to offer technology services for free you will pay some way.  For many that cost comes through the loss of private information....
Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer.  For MGM Resorts they found out that the data they...
Liability belongs to You: Misconfigured Clouds and Security

Liability belongs to You: Misconfigured Clouds and Security

Liability belongs to You: Misconfigured Clouds and Security Companies that were sold on Cloud Services as a cost-effective solution to maintaining a corporate server with specialized software were ill-equipped to understand all of the technological security...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...