Traditionally, access to computers, websites, and systems have been dependent on two things: a username and a password. The username identifies who you are, while the password authenticates that you Read more
Social security numbers, dates of birth, and driver’s license numbers were never designed to be used as universal passwords to authenticate consumer identities. Despite this, they’ve been widely Read more
You likely saw the news yesterday about the Equifax data breach compromising the personal information of as many as 143 million Americans. (If not, check out the details here: Giant Equifax data Read more
An SLA, or Service Level Agreement, is a set of additional terms and conditions between you and your service provider that sets minimum expectations of the quality and availability of service they Read more
Last week, we took an evening trip to visit a NorthSky client and do some belated Spring cleaning! After years of tinkering, adding, and re-configuring by 3rd party vendors and other tenants, this Read more
An increasing trend is for companies to allow employees to “bring your own device” (BYOD) to work. This along with an increase of remote workers and virtual offices has led to more and more Read more
While only a few make the news, organizations across the world are being breached every day with over 7 billion credentials and identities leaked in the last decade. In 2012 and 2014, breaches of Read more
Data backups are the safety net for recovering from just about any system failure, hardware loss, or destructive cybersecurity incident. Far too often, the effectiveness, completeness, and Read more
Please note, the following article is based on developing information and will be updated as more accurate data is made available by the security community who continues to analyze the threat. This Read more