As more customers ask for demonstrated SOC 2 reports, achieving a SOC 2® has become even more necessary for today’s […]
OCD Tech can test your security posture and provide you with the information needed to make appropriate decisions to mitigate […]
TSA new cybersecurity rules
OCD Tech believes stay informed is the best way to stay protected, read this interesting article from The Washington Post […]
The increasing use of mobile devices in our personal lives has led to a growing acceptance of smartphone usage at […]
3 signs it is time to hire a Virtual CISO
As cyber attacks become more prevalent, businesses are increasingly turning to virtual Chief Information Security Officers (CISOs) to help protect […]
What is a Homoglyph Attack?
In a homoglyph attack (also sometimes called a homograph attack), the threat actor uses homoglyphs to spoof a URL or […]
PAM is one of the most critical aspects of a strong information security program that every company needs to incorporate […]
What should I do if I suspect my company is being hacked? If you suspect that your company is being […]
Privileged Access Management (PAM) is a critical aspect of any organization’s security strategy. In today’s digital world, the importance of […]
Lateral movement is the process by which an attacker moves laterally within a network to gain access to additional resources […]