Got Hacked? Windows Tasks & Processes

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]
Got Hacked? – Windows Registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]
What is Quantum Computing?

What Is Quantum Computing? And When Will The Age Of Binary Computing End? What is a Quantum Computer? The primary difference between a quantum computer and the one you’re reading this on is the processor. Today’s processors are Binary, meaning they use Zeros and Ones (0 and 1), on or off, to process data. A […]
Apple Privacy and Security Myths

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
10 Tips To Deter Social Engineering

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]
10 Tips To Get Cloud Ready

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]
Magic Inside QR Codes

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]
Stop Corporate Data Thieves Cold

Stop Corporate Data Thieves Cold Help To Restore Your Peace of Mind Not every employee and asset in your office works for you. Sure, there are those who secretly surf the web or watch videos all day. Those are petty thieves compared to the real insider threats hiding in your organization. How did they get […]
Latest Breach Data Tells All

Latest Breach Data Tells All What We Can Learn From Others’ Failures Verizon recently released its 2024 Data Breach Investigations Report. You can find it here (Link). The report covers over 30,000 incidents, of which over 10,000 were deemed actual breaches. To clarify, their percentages do overlap, so don’t roast me when I quote numbers […]
Top 10 Ways To Prevent Data Leaks

Top 10 Ways To Prevent Data Leaks Clean Up On Aisle 5! Your company leaks data constantly. How do I know? Recently, my team and I trained with a world-renowned hacker, PenTester, and bug hunter to learn the latest threats. Some targets you could guess. But, he opened our eyes to some sneaky tactics that […]