As technology continues to evolve, so do the threats posed by cybercriminals. Cybersecurity has become more critical than ever before, […]
In today’s technology-driven world, cybersecurity has become a top priority for businesses, governments, and individuals alike. The rise of cybercrime […]
By Jeff Harms My LinkedIn profile recently congratulated me for my seven year anniversary with OCD Tech, LLC. I am […]
Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier […]
SOC 2® Reports: Type 1 and Type 2, which is right for my organization?
As more customers ask for demonstrated SOC 2® reports, achieving a SOC 2® has become even more necessary for today’s […]
Carnival Cruise Fined for Cybersecurity Violations by New York State
Some companies transgressions can be seen as a guide of “what not to do” in terms of cybersecurity compliance: repeated […]
Conducting Old School OSINT A man bumps into you in a crowded café and almost immediately his eyes light up. […]
Which SOC 2® Trust Services Categories are right for my organization?
SOC 2® can apply to most service organizations, including companies who provide analytics, business intelligence, managed IT security service providers, […]
Though open source intelligence (OSINT) is often seen as a development of the modern age and the product of a […]
The Human Firewall
You’ve set up multifactor authentication and antivirus, enabled backups, secured physical devices and your WiFi, and you’ve spent hours configuring […]