What We’re Thinking

We’re passionate about technology, and we want to share that with you! Read our thoughts on technology, the latest security threats and business trends along with our ideas for ways you can incorporate new and future technologies into your life and business.

Single lit lightbulb on a cord next to multiple unlit lightbulbs
Checklist

Corporate Security Checklist

 |   |  Business & Strategy, Security

In this day and age, cybersecurity is everyone’s job. That said, I recognize that with news of a new breach or hack reaching the mainstream media almost every day, it can be daunting trying to protect yourself – never mind your entire organization.

Read More >

NYDFS New York Wall Street Sign

We Can All Learn From NYDFS Mandatory Cyber Security Regulations

 |   |  Security

On March 1st of 2017, New York became the first state to enact state-mandated cyber security guidelines for companies regulated by the state Department of Financial Services. These guidelines include 23 sections discussing specific technical safeguards financial institutions must have in place, such as data encryption, multi-factor authentication, security training for employees, appointment of a chief information security officer, and

Read More >

CyberSecurity

What You Need to Know About Petya Ransomware

 |   |  Security

You have likely heard the sayings “don’t reinvent the wheel,” and “imitation is the highest form of flattery.” Both aptly apply to Petya Ransomware, a threat currently affecting organizations worldwide. To explain, Petya is not new. First discovered in 2016, this form of ransomware that would not only encrypt files on the computer but also infect the Master Boot Record,

Read More >

Person with hand on mouse about to click

“Don’t Hover” Is the New “Don’t Click”

 |   |  Security

In the past, in order to see the true URL of a website, email address or file – all you had to do was hover your mouse over a link to verify that you were going to be sent in the right direction. Now, attackers have found a way to exploit even that.

Read More >

Chain with breaking link

The Weakest Link

 |   |  Security

Your organization is much more likely (2:1) to have an IT security incident caused by an internal user rather than by someone from the outside.

Read More >