Under the Radar: USB Vulnerability.

We think a lot about anti-virus, spam filters, phishing attempts, spyware, firewalls, complex passwords, and countless other cybersecurity measures and concerns. But what many of us rarely think about are the USB devices we’re plugging into our computers on a daily basis, giving these devices direct and often unfettered access to the soft underbellies of…

Lockdown: Google Advanced Protection.

Are you the CEO of a Fortune 500 company? A politician sitting on a classified National Security committee? A descendant of Colonel Harlan Sanders, closely guarding the secret recipe for Kentucky Fried Chicken? If you answered “yes” to any of these and you have a Google account, then prepare yourself for Google Advanced Protection –…

Video: The 15 Worst Data Breaches of the 21st Century. 

​If you thought “The Lord of the Rings” had nothing to do with Information Technology… think again.  Have you seen or read “The Lord of the Rings”? If so, recall the overarching theme of how something as seemingly tiny and insignificant as the One Ring could cause such vast conflict and chaos across Middle-Earth. Or…