Got Hacked? Windows Tasks & Processes

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]
Got Hacked? – Windows Registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]
Apple Privacy and Security Myths

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
10 Tips To Deter Social Engineering

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]
10 Tips To Get Cloud Ready

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]
Magic Inside QR Codes

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]
Stop Corporate Data Thieves Cold

Stop Corporate Data Thieves Cold Help To Restore Your Peace of Mind Not every employee and asset in your office works for you. Sure, there are those who secretly surf the web or watch videos all day. Those are petty thieves compared to the real insider threats hiding in your organization. How did they get […]
Latest Breach Data Tells All

Latest Breach Data Tells All What We Can Learn From Others’ Failures Verizon recently released its 2024 Data Breach Investigations Report. You can find it here (Link). The report covers over 30,000 incidents, of which over 10,000 were deemed actual breaches. To clarify, their percentages do overlap, so don’t roast me when I quote numbers […]
Top 10 Ways To Prevent Data Leaks

Top 10 Ways To Prevent Data Leaks Clean Up On Aisle 5! Your company leaks data constantly. How do I know? Recently, my team and I trained with a world-renowned hacker, PenTester, and bug hunter to learn the latest threats. Some targets you could guess. But, he opened our eyes to some sneaky tactics that […]
10 Privacy Tips for Business Owners

10 Privacy Tips for Business Owners Limit What You Share To Protect Your Business For business owners, privacy can be difficult. Growing a business requires leaving your desk, meeting new people, and seizing opportunities when they come along. As a business leader, you’ve read all the books. You walked in the shadows of giants who […]