CASE STUDIES

BLOG

 

NPO’s and volunteer security nightmare

  Not-for-profits have an unusual issue regarding security. Firms that have trained, paid full-time employees have a strong level of control over the actions of their workers. NPOs, however, may rely heavily on volunteers whose time in the office may be ...
Read More

How to Spot a Phishing Attack

Would you know if you were the subject of a phishing attack [insert link to first blog]? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were ...
Read More

Security and your sub-contractors

  So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may ...
Read More

Cyber Crime and Security for SMBs

  Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his ...
Read More

Breaking Down Phishing

Breaking Down Phishing While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the ...
Read More

Government regulations

   Any business that stores customer payment information must comply with a number of state and federal regulations. The legal, healthcare, and financial sectors have a number of laws tailored specifically for them (such as HIPAA or CISPA). If you run ...
Read More