
FRAUD AWARENESS WEEK
In the realm of information technology, cybersecurity refers to the set of technologies, processes, and practices designed to protect computer...
Call us today! 844-OCD-TECH
In the realm of information technology, cybersecurity refers to the set of technologies, processes, and practices designed to protect computer...
As the world becomes more interconnected through technology, cybersecurity has emerged as a critical issue for businesses and governments. Cybercriminals...
By Jeff HarmsMy LinkedIn profile recently congratulated me for my seven year anniversary with OCD Tech, LLC. I am approaching...
Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier...
Some companies transgressions can be seen as a guide of “what not to do” in terms of cybersecurity compliance: repeated...
Conducting Old School OSINT A man bumps into you in a crowded café and almost immediately his eyes light up....
Though open source intelligence (OSINT) is often seen as a development of the modern age and the product of a...
You’ve set up multifactor authentication and antivirus, enabled backups, secured physical devices and your WiFi, and you’ve spent hours configuring...
CI) operators should increase their readiness for an attack. A CI disruption could bring the U.S. economy to a halt and previous attacks such as the Colonial Pipeline, JBS foods, and SolarWinds are testaments to the power of a well-executed cyber-attack.
On March 9th, 2022, the Security and Exchanges Commission (SEC) issued several proposed amendments that could have a big impact on businesses.
© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance