TechGuard Blog


How to Respond to a Breach within your Company

Every day we hear of another breach and as they continue to pop up, we become less surprised. Information travels quickly. For example, consider how many stories of breached data you've heard of in the news lately. Most will remember some of the famous ...

What is IT Security worth without Physical Security?

If your organization has a high standard of IT security but is lacking in physical security, you're leaving yourself vulnerable. There's so much to protect ranging from human safety and private information to physical assets and more. Protecting your...

Recommendations for the Log4j Vulnerability

A remote code Execution has been detected in the wild, known as the Log4j Vulnerability. This vulnerability allows an attacker to have the potential to carry out remote code execution on Java-based apps using Log4j or webservers with Apache Log4j.

Is Public Wi-fi Safe for Business Use?

No. Kind of.

Protect Yourself this Holiday Season

The holiday season brings many people joy for obvious reasons. Families get together, kids get to experience possibly the most innocent and joyous time, Christmas morning with Santa. For others, however, it can bring some stressful situations.

Beware Online Scams This Holiday Shopping Season

Every year advancements in technology allow us to get more and do more than years prior. Everything is faster because people want and expect things faster. We’re accustomed to it now, and businesses know they must keep up with consumer demand to survive....

What DOD Contractors Need to Know About CMMC’s New “Strategic Direction”

The Cybersecurity Maturity Model Certification (CMMC) program is being revised to streamline compliance for contractors in the Defense Industrial Base (DIB) looking to do business with the government. This is great news for small businesses, which might...

Could Your Password be Hacked?

A password can secure an account and prevent unauthorized usage. Could hackers guess your log-in credentials? In a recent survey of passwords of Western Australian government officials, some interesting password statistics were discovered. Almost 1,500...

The Cybersecurity Labor Shortage

If you’re anything like me, you’re a little tired of hearing about Covid. You’re tired of hearing about the “shortages” that seem to follow along with the timeline of Covid. I’ve heard them all; coin shortage, toilet paper shortage, sanitizer shortage,...

'Check the Box' Compliance Isn't Enough

How does your company handle security compliance? Is your approach to security the bare minimum, or is it next level? Does your company follow through with recommendations after they check the boxes? Security compliance is a good and necessary starting...

The Evolution of The Hacker

If you're reading our blogs, chances are you will recall us emphasizing the fact that hackers have evolved through the years making it increasingly challenging to stay ahead of threats. Consider how much has changed since hacking began. You may recall a...

Cybersecurity BEYOND the Troposphere

Technology, much like the industrial revolution, has changed the fundamentals of how humans exist in the world. In 1712, the first example of a steam engine was invented by Thomas Newcomen. Though it wasn’t very useful, it started the revolution. It then...

1 2 3 4 5

 


 

Read More Articles →