Blog

September 13, 2019
cloud computing

Combatting the Security Risks of Cloud Computing

Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities.  Cloud services are making it possible for businesses to place their […]
May 15, 2019
Privacy and Data Protection

The Reason why Application Leaders should care about Privacy and Data Protection

As of July 2018, downloadable apps on the Apple App Store reached 3.2 million. Data shows that social media applications are the most frequently used, allowing people to connect — […]
February 8, 2018
malware ransomware

Do Not Be Held Hostage by Ransomware Attacks

In 2016, the FBI warned of the rise of the incidents of ransomware. Since then, these malicious applications have continued to grow in sophistication. Evolving new cyberattack modelsare being developedresultingin […]
January 31, 2018
Malware

Developing Safeguards to Combat the Rise of ATM Malware

ATM is one of the great convenience of this modern financial age. However, ATMs have been plagued with increased attacks as criminals are exploiting hardware and software vulnerabilities to exploit […]
January 24, 2018
Cyber Security Consulting

Boosting Your Security Posture with Security Analytics

With the rise of cyberincidents, organizations continue to search for effective tools and strategies to fight against cybercrimes and to build resilience in their environment. Based on the 2017 Trustwave […]
September 21, 2017

The Business Impact of Unsecured Mobile Devices

In 2016, it was discovered that mobile device breaches cost enterprises millions of dollars.Lookout, a global leader in mobile security, and Ponemon Institute conducted a study on the economic risk […]
April 29, 2016
Cyber Security Consulting

The Need for Ongoing Security Awareness Training

Humans are often regarded as the weakest link in a security breach. According to a study from CompTIA conducted in 2015, which surveyed people from several organizations in the United […]
February 20, 2016
Cyber Security Consulting

2015 Top Cyber Breaches: Are You Next?

169 million records were compromised in the 781 recorded incidents in 2015.[1]  That is more than the population of California, Texas, Florida, New York, Illinois, Pennsylvania, Ohio, Georgia and North […]
December 23, 2015
Cyber Security Consulting

Cloud Computing 101

Visionary Steve Jobs once spoke of a dream in which data could be uploaded and accessed anywhere. Before there was the cloud, there were floppy disks, CD ROMs and very […]