Fraud Alert: Who is Really Behind that Text?
There is a very popular scam on the rise, where fraudsters are using to gain access to sensitive financial information. These...
Call us today! 844-OCD-TECH
Penetration testing refers to the attempt to identify – and crucially exploit – vulnerabilities in systems for the purpose of breaching a company’s defenses. A penetration test can be an extension of a vulnerability assessment.
There is a very popular scam on the rise, where fraudsters are using to gain access to sensitive financial information. These...
We promised to write about the tools of our trade. A few of the services we perform, whether it’s Vulnerability Assessment...
IT Audit & Security testing is a hot topic lately. With the reoccurrence of cyberattacks discussed by the media, and...
What if there was a way to identify future attacks on a company just by reading publicly available sources on...
On December 6th, 2016, two members of our team, Nick DeLena, Senior Manager and W. Jackson Schultz, Senior IT Audit...
In the world of IT Security, one question consistently rises to the top: Vulnerability Assessment vs. Penetration Testing—which one do you...
In Case You Missed It – CEO Fired After Wire Transfer Scam Results in $47 Million (USD) in Losses In...
Pokemon Go is just the latest example in a growing list of smartphone security breaches. It has been reported that...
In a landscape-shaping turn of events, the first HIPAA Business Associate has been required to face and pay a $650,000...
Featured in the May 2016 Massachusetts State Automobile Dealers Association (MSADA) Magazine (www.msada.org) From the corner window of your office, the front of...
© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance