How The Onion was Hacked

  • January 7, 2015

written by Chris Griesemer This month we will review a case study to learn how The Onion was hacked and review...

Data Breach Concept

A Closer Look at the Target Data Breach

  • December 2, 2014

written by Chris Griesemer Is your company vulnerable to attacks? Do you know what security questions to ask your vendors? How...

Information Technology Security and How to Outsmart Hackers

  • November 3, 2014

written by Chris Griesemer Is your company vulnerable to attacks? Do you know what security questions to ask your vendors? How...

Are There Security Risks with a Voicemail System

  • September 2, 2014

written by Chris Griesemer Most people don’t think about voicemail at work being a high risk piece of technology. What risks...

Top 5 Concerns for Your Bank’s Next IT Review

  • March 11, 2014

written by Chris Griesemer Before regulators arrive for your banks next IT Review, do you ever find wonder what topics they...

What’s at Risk with Use of Smartphones

  • March 1, 2013

Is it not amazing how powerful these smartphones we carry around are? They are tiny computers which allow us to do...

Chris Griesemer Promoted to Partner

  • December 9, 2011

The Whitlock Company congratulates Chris Griesemer on his promotion to a Partner of the firm. Chris has been a valued member...

How Social Engineering Can Harm Your Company

  • November 2, 2011

written by Chris Griesemer Over the past year, Social Engineering has become a very hot topic. Here’s one example of a...