Cloud Computing and Potential Risks

  • October 16, 2013

written by Chris Griesemer Cloud computing consists of using hardware and software over the internet. Here are some examples of Cloud...

Tips for Businesses to Manage Social Media Risk

  • April 1, 2013

written by Josh Beaird Social media has become a part of our daily lives and it doesn’t appear to be going...

What’s at Risk with Use of Smartphones

  • March 1, 2013

Is it not amazing how powerful these smartphones we carry around are? They are tiny computers which allow us to do...

Website Hacking: How Secure is your Site?

  • February 4, 2013

written by Chris Griesemer When I talk with community banks and business owners about high risk technology most everyone believes their...

How Your Company is affected by Vulnerabilities and Patch Management

  • December 12, 2012

written by Chris Griesemer Vulnerabilities are threats or holes in software allowing a person of low ethical values (or hacker), the...

Potential Risks of Cloud Computing

  • November 7, 2012

written by Chris Griesemer Cloud computing consists of using hardware and software over the internet. Here are some examples of Cloud...

Back at DEFCON – 2012 Experience

  • October 3, 2012

written by Chris Griesemer Click here to read the previous DEFCON recap. This year I was fortunate to once again attend...

How Do I Guard Against Taxpayer Identity Theft?

  • March 1, 2012

The number of tax return-related identity theft incidents has almost doubled in the past three years to well over half a...

The Biggest Security Vulnerability

  • February 9, 2012

written by Chris Griesemer Microsoft releases a Security Intelligence Report twice a year. This report covers all areas of information technology...