I’m Hacked. Now What?

Have I Been Hacked?No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know you did not send. […]

Insider Threat: 3 Ways to Mitigate Risk

An insider threat is a security risk that originates from within the targeted organization. Anyone with access to sensitive information can become a threat to the organization, intentionally or unintentionally. Insider threat comes in many forms – it could be a current well-meaning employee who is negligent or unaware, or a disgruntled current or former […]

Creating a Cyber Secure Home

Overview In the past, building a home network was nothing more than installing a wireless router and several computers. Today, as so many of us are working, connecting, or learning from home, we have to pay more attention to creating a strong cyber secure home. Here are four simple steps to do just that. Your […]

Does the ‘Presidential Peloton’ pose a threat to national security?

How devices on the Internet of Things (IoT) complicate security from the White House to your house. Your data may not be quite as prized as, say, the President of the United States, but hackers love low-hanging fruit. In other words, although you might not have national secrets hiding in your Peloton, it doesn’t mean […]

Open for Business: What the business landscape looks like post COVID-19

As we cautiously emerge from stay-at-home orders and move into a slow but steady pace toward normalcy, we can all agree that technology has seen us through this strange and uncertain time.  With many remote workers soon returning to their offices, there will come a certain shift in how businesses conduct themselves, and how they […]

Internet of Things: The cybersecurity threat of aging legacy systems

When it comes to the Internet of Things (IoT) the list of ‘things’ is endless. Everything from cellphones, to headphones, home security devices to refrigerators are now accessible and connected to the internet. This is great news for advancement in technology, but it also opens new and exciting opportunities for cybercriminals, especially if the ‘thing’ […]