CCPA – Compliance Before Consequence
by Sarina Resnick on May 8, 2019 at 1:02 PM
Becoming compliant with new laws can be frustrating. Companies are finally making it over the curve of being completely compliant under the recent General Data Protection Regulation (GDPR), and now there is yet another regulation that needs to be complied with. As of June 2018, The Ca …
Trends and Tactics in Phishing
by David Bienkiewicz on May 1, 2019 at 1:00 PM
When I’m tasked with creating phishing emails for clients, I begin by looking up what the recent phishing trends are in the real world, or the top 10 most reported phishing attacks for the month / year. I often end up finding scams about winning the latest iPhone from a phone service …
Government Cyber Weaknesses & the Need for White Hats
by Todd Pritsky on April 15, 2019 at 1:01 PM
Have White Hat, Will Travel “A young boy, with greasy blonde hair, sitting in a dark room…[T]he weary system cracker telnets to the next faceless .mil site on his hit list.”
The Importance of a Business Impact Analysis
by CJ Hurd on April 6, 2019 at 1:03 PM
Wouldn’t it be nice if we could predict the future? You would know what stocks to invest in, what sports team was going win, and what lottery numbers to play. It sure would make life easy, wouldn’t it?! Well, unfortunately we can’t, so we are going to have to keep working hard, resear …
New York v. Illegal Withdrawal Specialists (23 NYCRR 500)
by Todd Pritsky on March 13, 2019 at 1:00 PM
A brief introduction into the recent New York State Department of Financial Services 23 NYCRR 500 cybersecurity regulations.
Software Development Lifecycle Simplified
by Sarina Resnick on March 3, 2019 at 1:00 PM
Project creation can be stressful, especially when creating something completely new. When creating a project that is software-based, there is a specific process that is created to aid the production of said project.