TechGuard Blog


Michelle Stamps

Michelle Stamps
Find me on:

Recent Posts

Your #1 Security Threat - Well-Intended Employees

Imagine you are sitting at the Urgent Care facility and waiting for a test result. The nurse comes in and says, "Karen, fortunately, you do not have strep." Oddly, you are not Karen and you did not come in to be tested for strep. However, you immediately...

Don't Make this Critical Mistake Before your Audit

AUDIT – that five-letter word that no business leader looks forward to hearing. Today, security-related audits are a critical (and often stressful) part of doing business. Audits not only ensure you are meeting industry standards, but they serve as an...

Bring Your Own Device: A Luxury or a Nightmare?

Flexibility in the workplace can be a beautiful thing, but companies should carefully weigh the security risks associated with allowing "Bring Your Own Device." In addition, employees should be fully aware of the potential ramifications. For example,...

Webcam and Audio Hacked

As you have probably heard, Apple disabled its Group FaceTime feature to fix a security flaw that was discovered. The security flaw allowed someone using Group FaceTime to listen in on the call recipient's microphone even if the call recipient did not...

The Shutdown affects Businesses' Cybersecurity

The longest government shutdown in U.S. history sparks several concerns, including implications to cybersecurity. Starting on December 21, 2018 and still going, we have reached day 27. With 800,000 federal workers affected, many wonder how long this will...

Cloud Services Security also Falls on You

There is a huge rise in the use of cloud security services as well as cloud-related security incidents and breaches. Cloud services are not going away and for good reason. They offer many benefits including improved data scalability. Even the U.S....

SIM Swap Attacks are Trending

Imagine you haven't received any phone calls lately and consequently learn that your phone is out of commission. You stopped receiving text messages and phone calls. What would you think? Would you suspect that you are victim of a SIM Swap Attack?...

2018's Major Breaches

Just like that, 2018 has come to an end. As we start to embrace the new year and our improved cybersecurity plans, let's recap some of the major breaches of 2018. Although we cannot change the past, understanding the vulnerabilities and major industries...

Social Engineering Takes on Many Shapes

Social Engineering takes on many forms including face to face, over the phone, in emails and through the mail. Some might refer to social engineering as scams or con-artists or think of famous movies like "Ocean's Eleven", but social engineering crimes...

Cybersecurity ROI - Overcome These 5 Challenges Before Facing Your Board

Convince your board of directors you can show the Return on Investment (ROI) of engagement in cybersecurity services. It seems simple enough. Get to the point. Show how investing in loss prevention services like cybersecurity will save your company...

Hackers and the Upcoming Election

After the 2016 Presidential Election, many have concerns over voting security. This midterm election will reveal whether the Republicans will remain dominant over the legislative branch or if the Democrats will reign power. There's no doubt that people...

Lock Hackers Out of Your Company's Wi-Fi

Wi-Fi technologies have created a world in which we can stay connected almost any time and anywhere. In fact, around the globe Wi-Fi has changed people's attitudes about where, when and how we work. According to researchers, more than two-thirds of...

1 2 3 4

 


 

Read More Articles →