Supply chain attacks came into focus recently with the discovery of the SolarWinds breach late last year. The shockwaves from this breach continue and it’s clear that no industry or entity is outside of the impact zone.

As organizations begin bringing employees and customers back into shared physical spaces safely, back-to-work solutions like thermal imaging have become the go-to strategies.However, since many of these solutions utilize the Internet of Things (IoT) technology to monitor organizations, they are

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently released a warning advisory regarding a massive cybercrime threat to hospitals and healthcare providers across the country. The recent spread of ransom attacks on healthcare systems in the

In the beginning of cybersecurity, there were access control lists. But before there was a need for access control lists or cybersecurity, there first had to be a recognition of potential harm. That threat was recognized in

Dan Nickolaisen September 28, 2020 0 Comments

The creativity of attackers continues unabated in their attempts to lure your users into providing access to critical assets. Vishing and smishing have joined the phishing family as popular methods for baited attempts to steal credentials or

Work is an action, not a place. A variety of technologies made this possible years ago, but working remotely wasn't a reality for most of us until earlier in 2020 when a global pandemic moved the functions

Contact Us