Posts

Protecting the Critical Infrastructure from cyber warfare

by Joe Clapp, senior consultant, SystemExperts for SC Magazine,…

Guideline for Reporting a Cyber Incident

In our last blog post, we covered the best practices for creating…

Protect Your Network with these Three Steps

In addition to being a security consultant by trade, I am a Chief…

Crisis Management Centers and Cyber Security

I was asked to contribute to an article about 911 communications…

Best Practices for Contracting with Cloud Service Vendors

I was recently asked about best practices for contracting with…

The Shift that EternalBlue May Have Caused Within IT Leadership

For leaders in IT, 2017 has been the year of EternalBlue (the…

What are the five most critical steps to take during the first 48 hours post data breach?

1. Protect – The first and most important (time sensitive)…

Hacking of Facebook pages possible, but not probable, experts say

by Kayla Canne, Sun Chronicle Staff, March 4, 2017 James Lang,…

The Dangers of Wireless Technology on the Road

How to Protect Your Data in Airports, Coffee Houses, and Hotels In…