Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

Internet Security Threat Report 20132023-08-10T23:39:28-07:00

Don’t Take Your Privacy for Granted – 13,000 Requests for User Data

I am again reading another story about the NSA.  This one is from ZDNet titled, Yahoo Reveals US Government Made 13,000 Requests for User Data. I am finding myself struggling with a solid opinion on the controversy over the NSA [...]

Don’t Take Your Privacy for Granted – 13,000 Requests for User Data2023-08-10T23:41:41-07:00

Do You Need A Food Printer?

You may have heard of the revolution coming in the form of the personal 3D printer; a device that can print physical representation of almost any object you can imagine.  Here is a link to more on 3D printers, http://en.wikipedia.org/wiki/3D_printing [...]

Do You Need A Food Printer?2013-06-12T01:16:27-07:00

Who Is Stealing Your Company Assets?

Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives.  In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]

Who Is Stealing Your Company Assets?2013-05-24T17:07:18-07:00

Ransomware Gangs Are Now Stealing Passwords

A few months back I wrote a blog called, Don’t Get Caught by a Ransomware Gang.   The blog warned that ransomware gangs are loading malware onto computers.  Back then the threat was in the form of unwanted encryption of your [...]

Ransomware Gangs Are Now Stealing Passwords2018-08-22T11:24:07-07:00

Is Cloud Computing a Bunch of Hype?

If you read all the press releases from many of the new vendors then the answer is yes, there is much hype surrounding the “cloud”. If you read the results from the latest Tech Target Cloud Adoption Index you would [...]

Is Cloud Computing a Bunch of Hype?2023-08-10T23:43:53-07:00

Offshoring of IT Services is Coming Home

I am on a flight to Florida for the OPDA Conference where I will learn from the best and brightest of my peers the current trends and the hottest new technologies.  On flights like this, I take the opportunity [...]

Offshoring of IT Services is Coming Home2024-03-14T00:24:59-07:00

The HIPAA Omnibus Rule Went into Effect on March 26, 2013

If you are a healthcare covered entity or a business associate to a healthcare provider you better get on your encryption game.  If you have not done your risk assessment you better do that, too.  Here is a good article [...]

The HIPAA Omnibus Rule Went into Effect on March 26, 20132023-08-10T23:44:32-07:00