Technology and Politics
As we are seeing in this current election cycle, technology is playing an important and increasing role in helping to determine who will...
Topic for small business staff meeting - Don’t reuse passwords
Business owners can show they care about their employees’ cyber safety outside of office hours as well as at work. Consider sharing cyber...
Xiny: Yet Another Android Trojan
Xiny is not new malware for the community. This was first noted in March 2015 (Dr. Web, 2016). Since this time the malware has received...
Hurricane Matthew a Reminder to Us All
This past week Hurricane Matthew roared along the east coast of the US wreaking havoc across numerous southeastern states. Despite the...
Small businesses should practice 3-2-1 back-ups to help combat ransomware
The likelihood of a business being a ransomware victim is significantly greater today than it was a year ago. According to a study by...
Insider Threats - A Growing Concern
The insider threat risk has never been larger and carried more concern than now. A few years ago a stock trading algorithm was liberated...
House Passes Improving Small Business Cyber Security Act of 2016
A bill introduced to the House of Representatives in April, 2016 is intended to help small businesses gain access to cybersecurity...
Threat Management: Internal & External
Threats to the enterprise abound from many different avenues. There basically is no limit as to where the threat may be directed from. A...
We visit MAD once again...
There was a phrase used back in the Cold War called MAD....Mutual Assured Destruction. Essentially it meant that no matter what the...
Vehicle Hacking: Beyond Proof of Concept & Applied!
In the overall scheme of our reality, vehicle hacking is relatively a new area of research. This timeline was in place due to advances in...

