by Tony Pietrocola | Aug 15, 2022 | Blog Posts
Being a realist, we all know acquisitions can be a gamble. As an optimist, I look at them as a game changer that can be an absolute launch point to long-term success. Of course, business history is riddled with stories of acquisitions that have gone wrong, but rarely...
by Arielle Miller | Aug 5, 2022 | Blog Posts
One in four mobile applications contains at least one high-risk security flaw. (Via NowSecure) Smartphones, since their rise to popularity in the late 90s and early 2000s, have become a large part of our society’s everyday life in hosting our...
by Samantha Parker | Aug 3, 2022 | Blog Posts
The numbers are in for July 2022– and let’s just say you’ll want to keep reading. As reported by Kon Briefing, cyber-attacks have affected more than 23 countries worldwide, with an estimated 54 breaches reported this past month. Below, we’ve...
by Arielle Miller | Jul 26, 2022 | Blog Posts
The biggest threat to cloud computing is poor identity, access, and credential management. While this has always been a threat to security, workplace changes brought on by the COVID-19 pandemic have made these threats more apparent. As remote and hybrid work...
by Peter Burg | Jul 18, 2022 | Blog Posts
Current State of Ransomware Attacks on Energy The increased dependence on digital communication, automation, and technology within major industries has posed a higher risk for cyber threats to vital industries, particularly the energy sector. With gas and oil...
by Samantha Parker | Jul 11, 2022 | Blog Posts
The popular consensus that Chromebooks and ChromeOS are superior in security among other devices and operating systems can be a dangerous belief that leads to complacency and negligence in implementing proper security measures. Chromebooks may have fewer security...