Blog Posts Reality Check on Mobile Apps, Devices, and the Lack of Privacy and Security Personally, or professionally, the use of mobile apps and social networks can reveal a lot…Don SortorJuly 25, 2023
Blog Posts Apple Beefs Up Security – Is It Enough? Apple computer announced that it is now going to provide end-to-end encryption for the items…Don SortorDecember 9, 2022
Blog Posts Healthcare Group Notifies Millions of Patients After Hack Another day, another cyberattack. In March, Shields Health Care Group, Inc. discovered suspicious activity resulting…Don SortorSeptember 13, 2022
Blog Posts Banks Nearing $1 Billion Settlement Over Use of Banned Messaging Apps Yesterday's Wall Street Journal ran a story about how some of the biggest banks are…Don SortorAugust 20, 2022
Blog Posts Ukraine War Steps Up Cyberattacks According to a Wall Street Journal article, Russian intelligence agencies have increased the pace of…Don SortorJuly 15, 2022
Blog Posts How China is Exploiting Network Providers and Devices Earlier this month, a joint Cybersecurity Advisory was coauthored by the National Security Agency (NSA),…Don SortorJune 13, 2022
Blog Posts Is Your Organization Vulnerable? Last year in March, Verkada, a security firm and video surveillance provider was hacked. The…Don SortorJune 9, 2022