Pokemon Go is just the latest example in a growing list of smartphone security breaches. It has been reported that some users may have inadvertently compromised their phone when they downloaded the application by giving hackers access to their gmail accounts. In addition to the compromised gmail accounts, there are instances of hackers being able […]
About Don Lander
Joining the firm in 2014, Don is a Project Manager. Prior to joining the firm, Don was an IT Implement manager for a number of major financial services corporations in the Boston and Providence area for the past 25 years.
advice cell phone CEO CYBER CYBERAWARE cyber intel cyber security data breach disaster recovery DR employee encryption fines fraud fs-isac hack hackers hacking hipaa Information Security infosec intel IT AUDIT ITGC IT Security jobs laptop encryption MA 201 CMR 17 NICK DELENA NPPI OCD TECH password pastebin PII scam security SOUTH SHORE IT AUDIT threat intel Threat Intelligence video vulnerability assessment wep wifi working wpa
- Join our free 1-hour webinar on June 28. Learn to protect your business, customers, & employees! Register Today: http://t.co/BJ2z7bpxvq 4 days ago
- Prepare now for cyber incident reporting DFARS requirements! #DFARS #cybersecurity #incidentreports… http://t.co/7i2nHBzOXj 6 days ago
- The AICPA just released a new examination engagement based on an entity's cybersecurity risk management program.… http://t.co/vW0R1Ka7mU 7 days ago
- Staff spent Friday at Cradles to Crayons, in conjunction w/ MSCPA Day of Service, assembling kid packs for children… http://t.co/5jRoFsvUdF 7 days ago