Website Hacking: How Secure is your Site?

  • February 4, 2013

written by Chris Griesemer When I talk with community banks and business owners about high risk technology most everyone believes their...

How Your Company is affected by Vulnerabilities and Patch Management

  • December 12, 2012

written by Chris Griesemer Vulnerabilities are threats or holes in software allowing a person of low ethical values (or hacker), the...

Potential Risks of Cloud Computing

  • November 7, 2012

written by Chris Griesemer Cloud computing consists of using hardware and software over the internet. Here are some examples of Cloud...

Back at DEFCON – 2012 Experience

  • October 3, 2012

written by Chris Griesemer Click here to read the previous DEFCON recap. This year I was fortunate to once again attend...

How Do I Guard Against Taxpayer Identity Theft?

  • March 1, 2012

The number of tax return-related identity theft incidents has almost doubled in the past three years to well over half a...

The Biggest Security Vulnerability

  • February 9, 2012

written by Chris Griesemer Microsoft releases a Security Intelligence Report twice a year. This report covers all areas of information technology...

How Social Engineering Can Harm Your Company

  • November 2, 2011

written by Chris Griesemer Over the past year, Social Engineering has become a very hot topic. Here’s one example of a...

Improve Your Company’s Security with Patch Management

  • September 30, 2011

written by Chris Griesemer Although a lot of the subject matter in this article is geared towards banks and the countless...

Email Hoaxing – What Is It and How to Avoid It?

  • June 1, 2011

written by Chris Griesemer We are constantly seeing information about new viruses being distributed all over the internet. I could write...