Welcome to our “Threat Analysis” series of blogs! These posts cover a specific industry and the threats targeting them. The goal with this series is to raise awareness about cybercriminal threats, one post at a time.
As much of the world has had to shift to a work-from-home model in light of the COVID-19 pandemic, co
An expression commonly associated with the U.S. Navy is “every sailor is a firefighter.” This saying exemplifies the Navy’s policy of preparing every sailor for an emergency during basic training.
New Year’s Resolutions represent a desire to improve oneself in an area of life that may be neglected. Most of these resolutions are focused on health, finances, or happiness. These promises for the new year provide a convenient “cutover” date for…
Last month, we discussed the importance of practicing “defense-in-depth” within an organization.
The western front of World War I was initially highly mobile and dynamic. It wasn’t until the armies began to utilize basic entrenchments that the famous stalemate began. These basic defenses eventually grew to become a massive array of…
An HVAC vendor tells you that he needs to check your server rooms for proper airflow. You don’t think twice about letting him in, he does what he needs to, and he is gone before too long. A few weeks later, your company is plastered on the local…
Someone needs to tell cyber-criminals to take notes from old-west bank robbers. Who doesn’t love gunslingers loudly dueling it out with cowboys after busting into a bank vault with dynamite? The getaway while under fire was always the best scene in…
In the year 2000, people dreaded the “Y2K Bug” and believed that it would wreak havoc on the world’s technological infrastructure. These fears were founded off the belief that the applications and hardware would not be able to handle the date format…
Disaster Recovery and Business Continuity (or DRBC) is a key component of the operational infrastructure of any business. Yet many companies don’t think about it until an unexpected calamity arises.
There are many reasons your company should implement an IT governance framework.
Information is probably the most important asset of any business. As such, it needs a proactive management approach. Sadly, many small businesses lack the necessary technical and financial resources to commit full-time personnel to managing…
Customer demands are evolving each day. New service models and technologies are pushing conventional service providers from their comfort zones. These innovations are redefining industries from the IT to the financial sector.
What is NIST Compliance? The National institute of Standards and Technology is a government agency that is responsible for developing technology, its metric and standards that are necessary for driving economic competitiveness and innovation in…
Database management is a costly and challenging endeavor. It requires a lot of care and vigilance by qualified technicians. Databases are prone to cyber attacks, human errors, hardware breakdowns, and power outages.
Technology is constantly changing and it’s costing more each passing day. Sure, you can go online and order a home computer for less than $500 from Amazon but it’s a totally different world when you involve large database applications such as…
Today, social media activities, monetary transactions, and technology play important roles in the way organizations carry out their business and communicate with potential customers. These same vehicles can be targets for cyber attacks.
How safe is your network? Are you sure you have taken all the necessary precautions to protect it? Let’s discuss reasons you must do vulnerability assessments on your network. But before that, you need to get the facts right.
Employers must create good first impressions to their potential employees. Most workers are looking for more than just good wages. They are motivated by professional development and the company culture. To attract and retain good talent, a company…
The Benefits Of Using Third Party Services For RFP Services When Considering New Enterprise Software
The implementation of new enterprise software is not always an easy process. Consulting a third-party service provider for an RFP ensures that the process runs efficiently and smoothly.