As part of an International celebration, OCD Tech joins World Backup Day and invites you to do it too, be […]
Even if employees are returning to the office a few days every week, working hybrid will be a major part […]
SOC 2 Reports
As more customers ask for demonstrated SOC 2 reports, achieving a SOC 2® has become even more necessary for today’s […]
OCD Tech can test your security posture and provide you with the information needed to make appropriate decisions to mitigate […]
TSA new cybersecurity rules
OCD Tech believes stay informed is the best way to stay protected, read this interesting article from The Washington Post […]
The increasing use of mobile devices in our personal lives has led to a growing acceptance of smartphone usage at […]
3 signs it is time to hire a Virtual CISO
As cyber attacks become more prevalent, businesses are increasingly turning to virtual Chief Information Security Officers (CISOs) to help protect […]
In a homoglyph attack (also sometimes called a homograph attack), the threat actor uses homoglyphs to spoof a URL or […]
PAM is one of the most critical aspects of a strong information security program that every company needs to incorporate […]
What should I do if I suspect my company is being hacked? If you suspect that your company is being […]