Similar Posts
Will You be the Last to Know?
ByadminExternal attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
Internet of Things Dumpster Fire
ByadminThe Internet of Things refers to a class of smart devices that are typically used to automate things. This can be anything from a smart TV or smart door lock to an automated oil refinery and everything in between. Unfortunately, the security of many of these devices is to be really kind, lacking. The hackers…
Security Hanging by a PIN
ByadminThe most important part of your digital security is protected, typically, by a 4 digit PIN, assuming it is protected at all. Learn what this resource is and why it is at risk. audio video
The Challenges of Printing CUI
ByadminAs the Defense Department moves to more tightly control how Controlled Unclassified Information (CUI) is handled, contractors are going to need to deal with how documents that contain CUI such as drawings or deliverables are printed. Listen to this short explanation of what is going to be required. If you have questions, please contact us….
Beware of Bogus QR Codes
ByadminThe FBI has issued a warning about scammers posting bogus QR codes using a variety of different methods from printing them on a piece of paper to including the bogus codes in an application. Learn more: Audio Video
Disaster Recovery for Password Managers and MFA apps
ByadminMany of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
https://shorturl.fm/cbi3R
https://shorturl.fm/L1NvF
https://shorturl.fm/b3qll