Third Party Connections

A wireless network is a ubiquitous commodity to any organization. In that case, it should go without saying that security measures are in place with the latest wireless tools. If only that were the case. Close to 50% of IT leaders say their wireless components embody the weakest security link of their entire...

Online retailers have plenty of safeguards to protect shoppers from cyber attacks - from timed payment pages to captcha and more, security options are bountiful. So, when researchers found that one of the largest credit card companies in the world had a significant flaw in its payment system, there was...

Third party applications are a blessing and a curse - when properly vetted and secured by practiced cyber security veterans, they can be great tools for added growth and learning at an individual and business level. Unfortunately not all applications display this amount of integrity. Some with more questionable bases...

Applications are created every day that assist with financial and social intricacies of everyday life; however, there is a unique program called Civic that sends notifications when a particular social security number is used online. At its core, the service is akin to Credit Karma or even the opt-in notifications from brick...

Unless you've been living under a rock in the middle of the ocean for the past few weeks, chances are you've heard of Pokemon GO. Though I'm fairly certain even those living under said rocks in the middle of the ocean have heard of it. Moving on. Pokemon GO's fast-rising popularity is...

A wireless network is a ubiquitous commodity to any organization. In that case, it should go without saying that security measures are up to speed with the latest wireless tools. If only that were the case. Close to 50% of IT leaders say their wireless components embody the weakest security link of their...

Previous posts have addressed the security issues surrounding vehicles, third party applications and IoT - specifically, what barriers are in place to stop hackers from not only stealing data from your car, or even taking complete control over your vehicle and put you and your passengers in harm's way? Newer...

The impact of a compromised IT infrastructure extends far beyond an organization’s internal mechanisms and functions. Data breaches and security incidents increasingly put not just individual companies but also entire supply chains at risk. When it comes to cyber security and cyber attacks, the topic of accountability is broached often....

You’ve probably never thought about the cyber security of other organizations, like the third party vendors with which your company works. Perhaps the security of your clients, partners, and other business relationships does matter to you, but you trust that they are doing enough. While many organizations do take some precautions...