Last year’s SEC statement isn't legally binding, but here’s why public companies must comply As news of high-profile data breaches continuously grab headlines, boardrooms nationwide are scrambling to …
Privacy is DEAD!
Privacy is dead! And now we know WHO the hacker is - it's YOU! There, I've said it. We wantingly, willing give up our information in an endless pursuit of convenience and inquisitiveness, with …
How Do You Say Willie Sutton In Mandarin?
Reuters recently reported that Cloudhopper, an international hacking ring linked to the Chinese government, has been launching attacks on technology service providers in a campaign to steal data from …
Continue Reading about How Do You Say Willie Sutton In Mandarin? →
Malicious PDF’s 2.0
PDF's, portable Document Format, have long been a staple of business. They're easy to create, difficult to edit and work on any platfrom, from Mac to Windows to Linux. These traits, along with it …
Perspective
I grew up in a small town of about 9000 people. The funny thing about growing up in a Norman Rockwell picture is that everybody knows everybody, everybody knows your business. But, ultimately it means …
8 Simple Steps for Assessing Your Company’s Cybersecurity Risk
Risk assessments don’t just protect your company – they are also the law, in many cases It doesn’t take long for a data breach to become a company’s worst nightmare. Besides heavy financial costs …
Continue Reading about 8 Simple Steps for Assessing Your Company’s Cybersecurity Risk →