Companies spend millions on technology security annually to keep their virtual doors and windows locked. This investment is a huge waste of money if they haven’t adequately trained their employees about how to keep these doors and windows secured. Because of this oversight, employees can become the weakest link to an organization’s cybersecurity posture. This […]
About Don Lander
Joining the firm in 2014, Don is a Project Manager. Prior to joining the firm, Don was an IT Implement manager for a number of major financial services corporations in the Boston and Providence area for the past 25 years.
Pokemon Go is just the latest example in a growing list of smartphone security breaches. It has been reported that some users may have inadvertently compromised their phone when they downloaded the application by giving hackers access to their gmail accounts. In addition to the compromised gmail accounts, there are instances of hackers being able […]
- Keep Your Infrastructure Safe From Ransomware http://t.co/cJMf1PgN0Q 8 hours ago
- Top 5 Vulnerability Assessment Observations http://t.co/HmyEE5GR1p 1 day ago
- Cyber Challenges Outline – Briefing Your CEO, a Cheat-Sheet http://t.co/w7xQgCEGUj 2 days ago
- Key Reinstallation AttaCK: aka KRACK http://t.co/oZcpZGFeUl 2 days ago