2 min read
Considerations for Securing Online Meeting Software
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...
2 min read
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...
2 min read
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...
2 min read
Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...
2 min read
Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...
3 min read
Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...
2 min read
Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...
2 min read
Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...