Get Our Weekly Blog Sent Straight to Your Inbox
Grant Codak
Recent Posts
How to Talk to Your IT Admin About Compliance
Have you ever tried bringing up compliance with an IT Admin? It usually ends up in one of two ways. The first is that the administrator’s eyes will glaze over as they begrudgingly accept their fate to add yet another responsibility onto their already...
Business Security in a COVID World. Now What?
On May 1st, President Trump signed a state of the emergency order that declares foreign cybersecurity threats to the electrical system a national emergency. Shortly afterward on May 15th, a cyber attack was reported in the U.K. National Market....
Building Your Primary Defense Strategy Through a Security Awareness Program
How should I start? The question going through most business leaders and policymaker's minds, is often, “Where do I start?” Creating a solid plan and making it as extensible to your future growth as possible is usually the best approach. The first thing...
COVID-19: Teleconferencing Concerns
There have been a lot of questions around teleconference security during this pandemic. When people are forced to use a service more, the lack of understanding and security around the product breeds fear when they start to hear about the risks that are...
The Quantum Problem
Quantum cryptography or quantum encryption takes advantage of quantum mechanics to encrypt and secure message delivery. It acts similarly to modern-day encryption ciphers like AES or RSA However, when using a quantum computer for cryptography, it can...
Chaining Pathogens
Working from home? Are you finally catching up on all those updates and patches that you’ve neglected to take the time to install over the past couple of months? Well,Microsoft has also put a pause on all non-essential patches during the coronavirus...
TechGuard Attends RSA 2020
The focus of the RSA 2020 was the “Human Element.” This was certainly on display in a variety of different aspects. Attendance and foot traffic was noticeably down compared to events spanning prior years. Big names such as Verizon, IBM, and AT&T were...
Cyber Experts Have Found Themselves Using a New Four-Letter Word
Have your systems been tagged with a death note of ransomware? Ryuk has been making its rounds this December and causing holiday misery for organizations left and right this year. Typically, attacks increase near the holiday season and end of the year...
Camera App Vulnerability Allows Hackers a Look at Your Private Information
What is the most un-nerving action hackers can do to your smartphone? Perhaps, hack into your camera and watch you as you go about your day? What about jack into your microphone and listen to everything you say in your daily meetings? Well, a series of...
Are You Ready for CMMC?
Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over hereand take a look at the draft cybersecurity document that’s on the cusp of being implemented.
How You Can Better Manage Vulnerabilities
Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...
Compliance: You Actually Need It
One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business owns....