Category: Uncategorized

  • Aggressive Social Engineering

    Constantly we hear about scheme after scheme that businesses and consumers are being hit with. It seems every time we figure out one…another one is already in full swing. It is hard and frustrating to stay up to date and always ready. I mean, what happened to just having to hang up on the telemarketer a couple times a week during dinner….its rare to even sit down to dinner this day and age. Actually, who even has a house phone? I know I don’t have one. Being someone that actually performs some social engineering and scam attempts for my day-to-day job helps me stay aware and also get a good chuckle at some of the more simple attempts. Until I hear of someone who fell for it.

    (more…)
  • A possible open source solution for Microsoft Exchange

    As we interact weekly with with our clients we are continually asked about new software…especially open source software. Recently while on site we were asked about other options for the usual Microsoft Exchange route. That is why this caught my attention, Jack Wallen conducted a product spotlight on Tine 2.0 and provided a solid overview of a Groupware (Email, Calendar, Contacts, etc), CRM (content management), and ERP (enterprise resource planning) all rolled into one. They obviously can be used separate as well….but this provides an option in one stop.

    (more…)
  • Are you or your company breaking the law?

    Since legislation affecting the use of Internet-connected computers continues to broaden and increase in complexity. Tech Republic has created a list of the most recent and pending laws and rulings. You can find the list of ten here.

    (more…)
  • Breaking Privacy Laws without breaking privacy laws?

    courtroom.jpg (JPEG Image, 848x565 pixels) - (Build 20100202152834)

    Recently an Italian court found three Google executives guilty of breaking privacy laws for a video that was uploaded on YouTube in 2006. The video involved the bullying an autistic teenager. Why this gets a little…well interesting is: The video was not uploaded by any of the executives, they were not in the video, and the best part; the video was uploaded on YouTube just before Google even acquired them.

    Full article here.

    (more…)
  • Risk Management through Common Sense

    nodiving

    Disclosure: I’ll start out with the intent of touching on being proactive rather than reactionary in regards to risk management….but we’ll see where we end up!

    This blog idea came to me while I was driving through middle-of-nowhere West Texas. I have always noticed the growing prevalence of people feeling they are owed things and the increasing lack of common sense in this world, but never really said anything to more than just my friends. In late October, I was passing through a small po-dunk country town and noticed that the community pool had already been drained for the winter. Of course, in good small-town country fashion, all that was left was a deep empty cement hole. My first thought was thinking how refreshing it was to see that! You mean kids and adults are actually smart enough out here to realize that there is no water in there…so if you jump in you can actually hurt yourself?

    (more…)
  • Cybersecurity: Not Just For Financial Institutions

    Cyber Security- Not Just For Financial Institutions.png

    For many years, financial institutions have understood the importance of having a strong cybersecurity strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data safe. However, it is not only financial institutions that need to be vigilant about cybersecurity.

    (more…)
  • Cultivating Cybersecurity Talent in Your Organization [VIDEO]

    {{ script_embed(‘wistia’, ’64kt4as6mx’, ‘, ‘, ‘inline,responsive’) }}

     

    (more…)
  • Maintaining Security in the Era of Digital Currency

    Digital currency services allow for low-cost and efficient money transfers through highly secure channels. This technology helps transform the way people make online purchases, share money, and conduct e-commerce. Although you take advantage of numerous benefits, it is still important to protect yourself and your business. The following article will inform you of digital currency service developments and how to utilize this technology in the safest manner possible.security in digital currency bitcoin

    (more…)
  • Why Your Small Business Needs Identity Access Management

    Identity Access Management is a transformative security technology with a centralized system to keep employees and devices on your network private and secure while also ensuring that passwords are optimized for efficiency. That’s why Identity Access Management is becoming prevalent in small businesses as a low-cost, long-term solution to many major security issues present in today’s web environment. If you’re a small business owner, it’s time you became familiar with the benefits of this technology to decide if it’s right for your own company.Dollarphotoclub_79607083

    (more…)