Got Hacked? Windows Tasks & Processes

Retro CRT computer monitor showing a green progress bar and the word LOADING in checkered background. Illustration of the concept of downloading speed, slow bandwidth and low processing power task

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]

Got Hacked? – Windows Registry

Help I'm Trapped Inside this Computer registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]

What is Quantum Computing?

3D illustration of a working quantum computer. Quantum computing concept.

What Is Quantum Computing? And When Will The Age Of Binary Computing End? What is a Quantum Computer? The primary difference between a quantum computer and the one you’re reading this on is the processor. Today’s processors are Binary, meaning they use Zeros and Ones (0 and 1), on or off, to process data. A […]

Apple Privacy and Security Myths

worm walking on the outside of a red apple

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]

10 Tips To Deter Social Engineering

Angry furious young blonde deter

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]

10 Tips To Get Cloud Ready

A beautiful young blonde woman sheltering under a torn and tattered yellow umbrella looks up miserably as she waits for a thunderstorm cloud to pass.

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]

Magic Inside QR Codes

qr codes Young businessman with angel and devil on his shoulders.

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]

Stop Corporate Data Thieves Cold

High resolution digital image of a man in a kitchen, early in the morning, opening a cabinet and unintentionally releasing a swarm of juvenile raccoons. The raccoons are streaming from the open cabinet, and several of them have jumped onto the man, including one that is covering his face like a mask, one perched on his leg, and several hanging off of his arms. The raccoons have also knocked over a box of macaroni, and a can of tuna, because they are awful little creatures who have no respect for other people's things. The eye of the man is just visible beneath the raccoon covering his face, and his surprise and terror are obvious. Kitchen bathed in a warm golden morning light, and an Italian style coffee pot is sitting on the stove. Thieves

Stop Corporate Data Thieves Cold Help To Restore Your Peace of Mind Not every employee and asset in your office works for you. Sure, there are those who secretly surf the web or watch videos all day. Those are petty thieves compared to the real insider threats hiding in your organization. How did they get […]

Latest Breach Data Tells All

breach - The boss or CEO of a company holds a crystal ball while his employees gather around him to see what the future holds.

Latest Breach Data Tells All What We Can Learn From Others’ Failures Verizon recently released its 2024 Data Breach Investigations Report. You can find it here (Link). The report covers over 30,000 incidents, of which over 10,000 were deemed actual breaches. To clarify, their percentages do overlap, so don’t roast me when I quote numbers […]

Top 10 Ways To Prevent Data Leaks

Toddler leaks a snack all over the floor, but seems content to eat it anyways

Top 10 Ways To Prevent Data Leaks Clean Up On Aisle 5! Your company leaks data constantly. How do I know? Recently, my team and I trained with a world-renowned hacker, PenTester, and bug hunter to learn the latest threats. Some targets you could guess. But, he opened our eyes to some sneaky tactics that […]