NCSAM – Week 3 – Recognizing and Combating Cybercrime
Week 3: October 17-21, 2016 – Topic: Recognizing and Combating Cybercrime Cybercrime can take many forms, from targeted and sophisticated...
Call us today! 844-OCD-TECH
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, unauthorized access, or damage. It involves using technology, processes, and strategies to safeguard information and ensure systems remain secure and reliable.
Week 3: October 17-21, 2016 – Topic: Recognizing and Combating Cybercrime Cybercrime can take many forms, from targeted and sophisticated...
We often get asked about cyber security and cyber security assessments. Sometimes we are in the room when others are...
Week 2: October 10-14, 2016 – Topic: Cyber from the Break Room to the Board Room We are all part...
We promised to write about the tools of our trade. A few of the services we perform, whether it’s Vulnerability Assessment...
IT Audit & Security testing is a hot topic lately. With the reoccurrence of cyberattacks discussed by the media, and...
What if there was a way to identify future attacks on a company just by reading publicly available sources on...
On December 6th, 2016, two members of our team, Nick DeLena, Senior Manager and W. Jackson Schultz, Senior IT Audit...
In the world of IT Security, one question consistently rises to the top: Vulnerability Assessment vs. Penetration Testing—which one do you...
In Case You Missed It – CEO Fired After Wire Transfer Scam Results in $47 Million (USD) in Losses In...
Pokemon Go is just the latest example in a growing list of smartphone security breaches. It has been reported that...
© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance