Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

2023-08-10T23:39:28-07:00August 16th, 2013|

Do You Need A Food Printer?

You may have heard of the revolution coming in the form of the personal 3D printer; a device that can print physical representation of almost any object you can imagine.  Here is a link to more on 3D printers, http://en.wikipedia.org/wiki/3D_printing [...]

2013-06-12T01:16:27-07:00June 12th, 2013|

Who Is Stealing Your Company Assets?

Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives.  In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]

2013-05-24T17:07:18-07:00May 24th, 2013|

Ransomware Gangs Are Now Stealing Passwords

A few months back I wrote a blog called, Don’t Get Caught by a Ransomware Gang.   The blog warned that ransomware gangs are loading malware onto computers.  Back then the threat was in the form of unwanted encryption of your [...]

2018-08-22T11:24:07-07:00May 20th, 2013|

Is Cloud Computing a Bunch of Hype?

If you read all the press releases from many of the new vendors then the answer is yes, there is much hype surrounding the “cloud”. If you read the results from the latest Tech Target Cloud Adoption Index you would [...]

2023-08-10T23:43:53-07:00May 10th, 2013|

Offshoring of IT Services is Coming Home

I am on a flight to Florida for the OPDA Conference where I will learn from the best and brightest of my peers the current trends and the hottest new technologies.  On flights like this, I take the opportunity [...]

2024-03-14T00:24:59-07:00April 25th, 2013|

The HIPAA Omnibus Rule Went into Effect on March 26, 2013

If you are a healthcare covered entity or a business associate to a healthcare provider you better get on your encryption game.  If you have not done your risk assessment you better do that, too.  Here is a good article [...]

2023-08-10T23:44:32-07:00April 4th, 2013|