In the realm of information technology, cybersecurity refers to the set of technologies, processes, and practices designed to protect computer […]
As the world becomes more interconnected through technology, cybersecurity has emerged as a critical issue for businesses and governments. Cybercriminals […]
By Jeff Harms My LinkedIn profile recently congratulated me for my seven year anniversary with OCD Tech, LLC. I am […]
Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier […]
Carnival Cruise Fined for Cybersecurity Violations by New York State
Some companies transgressions can be seen as a guide of “what not to do” in terms of cybersecurity compliance: repeated […]
Conducting Old School OSINT A man bumps into you in a crowded café and almost immediately his eyes light up. […]
Which SOC 2® Trust Services Categories are right for my organization?
SOC 2® can apply to most service organizations, including companies who provide analytics, business intelligence, managed IT security service providers, […]
Though open source intelligence (OSINT) is often seen as a development of the modern age and the product of a […]
The Human Firewall
You’ve set up multifactor authentication and antivirus, enabled backups, secured physical devices and your WiFi, and you’ve spent hours configuring […]
Why we Should be Concerned About Critical Infrastructure Vulnerabilities
CI) operators should increase their readiness for an attack. A CI disruption could bring the U.S. economy to a halt and previous attacks such as the Colonial Pipeline, JBS foods, and SolarWinds are testaments to the power of a well-executed cyber-attack.