Categories

Google Says Phishing Attacks That Target Two Factor Authentication Are on the Rise. Here’s What You Can Do About It

For years, cybersecurity experts have tried to hammer the need for two factor authentication (2FA) into the minds of users. There’s a reason why. It is one of the most fundamental things one can do to protect digital assets. Yet, 2FA is not a panacea, and new phishing techniques show why. Recently Google has identified…

Read More No Comments

The Integrated Security Model: True Security

How secure is your office entry? How about your loading dock? Can you identify who inside your organization is disgruntled? What about outside? Who has been fired recently? Did they have access to sensitive files or IT property? When was the last professionally trained social media search of your company’s name? Industry? High level executives?…

Read More No Comments

A More Perfect Union

The Preamble to the United States Constitution sets lofty goals: “We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this…

Read More No Comments