Posts

Protecting the Critical Infrastructure from cyber warfare
by Joe Clapp, senior consultant, SystemExperts for SC Magazine,…

Guideline for Reporting a Cyber Incident
In our last blog post, we covered the best practices for creating…

Protect Your Network with these Three Steps
In addition to being a security consultant by trade, I am a Chief…

Crisis Management Centers and Cyber Security
I was asked to contribute to an article about 911 communications…

Best Practices for Contracting with Cloud Service Vendors
I was recently asked about best practices for contracting with…

The Shift that EternalBlue May Have Caused Within IT Leadership
For leaders in IT, 2017 has been the year of EternalBlue (the…

What are the five most critical steps to take during the first 48 hours post data breach?
1. Protect – The first and most important (time sensitive)…

Hacking of Facebook pages possible, but not probable, experts say
by Kayla Canne, Sun Chronicle Staff, March 4, 2017
James Lang,…

The Dangers of Wireless Technology on the Road
How to Protect Your Data in Airports, Coffee Houses, and Hotels
In…