TechGuard Blog


Taking IoT to the House

What is the Internet of Things (IoT)?   The “Internet of Things”, commonly referred to as IoT, brings internet connectivity to everyday devices allowing them to communicate and interact. IoT devices are meant to automate tasks for people at home, in...

Mobile Security Concerns on the Rise

One major take away from the recent RSA Conference is that companies are increasingly concerned about the growing threats with mobile devices. This is no surprise as we see employees working from almost any type of setting and always online. In...

RSA 2019 – San Francisco: Exhibition from the SMB Perspective

  So, let’s talk RSA.   March 4-8, 2019, RSA was held in the great “Tech Giant” city of San Francisco, California. If you are unfamiliar with RSA, it is one of the largest security conferences in the world. Not only is it held in multiple cities and...

Event Notice: Capture The Flag Event

  TechGuard Security is co-sponsoring the OWASP St Louis CTF Event.   Join TechGuard Security and OWASP St Louis on April 25, 2019 for this FREE CTF Event. Are you interested in showing off your skills, learning about network security, secure...

Critical Vulnerability in Drupal Disclosed - Active Exploits Found in Wild

 What is Drupal?   Drupal is one of the most popular Content Management Systems (CMS) around, allowing users to build custom websites with ease using thousands of themes and plugins.  The rich features of the software attract a lot of organizations to...

Keep Employees Safe from SMiShing Attacks

  Dear Jon, Capitol One needs you to verify your PIN number immediately to confirm you are the proper account holder. Some accounts have been breached. We urgently ask you to protect yourself by confirming information here...   If your employee...

Your #1 Security Threat - Well-Intended Employees

Imagine you are sitting at the Urgent Care facility and waiting for a test result. The nurse comes in and says, "Karen, fortunately, you do not have strep." Oddly, you are not Karen and you did not come in to be tested for strep. However, you...

Don't Make this Critical Mistake Before your Audit

AUDIT – that five letter word that no business leader looks forward to hearing. Today, security related audits are a critical (and often stressful) part of doing business. Audits not only ensure you are meeting industry standards, but they...

Bring Your Own Device: A Luxury or a Nightmare?

Flexibility in the workplace can be a beautiful thing, but companies should carefully weigh the security risks associated with allowing "Bring Your Own Device." In addition, employees should be fully aware of the potential ramifications. For example,...

Webcam and Audio Hacked

As you have probably heard, Apple disabled its Group FaceTime feature to fix a security flaw that was discovered. The security flaw allowed someone using Group FaceTime to listen in on the call recipient's microphone even if the call recipient did...

Four Risks and Solutions when using QR Codes

Today’s technology provides hackers countless ways to gain unauthorized access to private and sensitive information. News of breaches and cyberattacks are far too common and over the past two years over 100 million Americans have been impacted....

The Shutdown affects Businesses' Cybersecurity

The longest government shutdown in U.S. history sparks several concerns, including implications to cybersecurity. Starting on December 21, 2018 and still going, we have reached day 27. With 800,000 federal workers affected, many wonder how long this...

1 2 3 4 5
... 6

 


 

Read More Articles →