Tips for Businesses to Manage Social Media Risk

  • April 1, 2013

written by Josh Beaird Social media has become a part of our daily lives and it doesn’t appear to be going...

What’s at Risk with Use of Smartphones

  • March 1, 2013

Is it not amazing how powerful these smartphones we carry around are? They are tiny computers which allow us to do...

Website Hacking: How Secure is your Site?

  • February 4, 2013

written by Chris Griesemer When I talk with community banks and business owners about high risk technology most everyone believes their...

How Your Company is affected by Vulnerabilities and Patch Management

  • December 12, 2012

written by Chris Griesemer Vulnerabilities are threats or holes in software allowing a person of low ethical values (or hacker), the...

Potential Risks of Cloud Computing

  • November 7, 2012

written by Chris Griesemer Cloud computing consists of using hardware and software over the internet. Here are some examples of Cloud...

Back at DEFCON – 2012 Experience

  • October 3, 2012

written by Chris Griesemer Click here to read the previous DEFCON recap. This year I was fortunate to once again attend...

How Do I Guard Against Taxpayer Identity Theft?

  • March 1, 2012

The number of tax return-related identity theft incidents has almost doubled in the past three years to well over half a...

The Biggest Security Vulnerability

  • February 9, 2012

written by Chris Griesemer Microsoft releases a Security Intelligence Report twice a year. This report covers all areas of information technology...

How Social Engineering Can Harm Your Company

  • November 2, 2011

written by Chris Griesemer Over the past year, Social Engineering has become a very hot topic. Here’s one example of a...