For years, cybersecurity experts have tried to hammer the need for two factor authentication (2FA) into the minds of users. There’s a reason why. It is one of the most fundamental things one can do to protect digital assets. Yet, 2FA is not a panacea, and new phishing techniques show why. Recently Google has identified […]
Category: Uncategorized
The Integrated Security Model: True Security
How secure is your office entry? How about your loading dock? Can you identify who inside your organization is disgruntled? What about outside? Who has been fired recently? Did they have access to sensitive files or IT property? When was the last professionally trained social media search of your company’s name? Industry? High level executives? […]
A More Perfect Union
The Preamble to the United States Constitution sets lofty goals: “We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this […]