Top 10 Cybersecurity Risks For 2019

Author(s):

Duncan Kingori, ,

2019 Cyber Risk Man Assessing Servers Blue Illustration Password

2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally being addressed due to the intensity and volume of attacks. 2019 is a fresh year and you can be sure … Read more

App Access: Life Invasion

Author(s):

Josh Henry, ,

Guy in front off computer with app access

Life Invasion: Your Privacy A problem that has been occurring for years is finally generating concern. 77% of Americans own smart phones. Majority of those people make the mistake of allowing apps such as Facebook to gain access to their camera roll. It all seems innocent until your private photos start trending and get into … Read more

IOT Devices- Information Outsourcing Terror

Author(s):

Josh Henry, ,

Iot Device Alexa against a blue background, speech bubble with gears.

IoT Devices are on the Rise A rising trend in consumer markets today are the virtual assistant such as Amazon’s Echo or the Google mini. Juniper Research predicts that 55% of homes in the U.S. will feature an IOT device by 2022. This ushers in a debate regarding the privacy and security of your information. … Read more

Identity of Things: IoT Security

Author(s):

Tricia A. Howard, ,

Hand holding up interconnected city, innovation, IoT security, blue background, abstract

It is no secret that IoT Security (or lack thereof) has taken the industry by storm – and with good reason. Thanks to a couple of newsworthy incidents involving the (in)famous Internet of Things, most organizations are rethinking their overall IoT security posture. However, that is a daunting task to master. With such a variety … Read more