About Us | Contact Us
View Cart
Archive for 'Articles' Category

Reminder: Siri Risk!

By Jolley | Hadaway - Last updated: Sunday, June 17, 2018

Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]


Don’t Believe Your Eyes: Router-Based Malware Can Change Website Data

By Vigilize - Last updated: Sunday, June 10, 2018

Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data in transit and change what you see on your screen. An article review. Initially, researchers thought that a new piece of router-based malware called VPNFilter was a relatively simple tool for directing and implementing a distributed denial of service (DDoS) attack. […]


Alert Fatigue: A Problem With Few Easy Solutions

By Vigilize - Last updated: Sunday, June 3, 2018

Getting a message to the user is one thing, having them see it is another… An article review. In IT we often focus on identifying and communicating risk: to our users, to our superiors and to others in the field. Over the years, we’ve even developed new tools and methods to identify issues and notify […]


Project Indigo: Blurring The Lines Between Government and Private Sector Cybersecurity

By Vigilize - Last updated: Sunday, May 27, 2018

US Cyber Command joins with the FS-ISAC to share threat intelligence… An article review. Threat intelligence sharing is a concept we’re all probably familiar with, at least in passing–it’s hard to imagine where we’d be without the efforts of organizations that work to identify and communicate new and developing threats! However, until relatively recently those […]


Unless You Are Based in Europe

By Dan Hadaway - Last updated: Sunday, May 27, 2018

Some businesses are attempting to capitalize on confusion over just who the GDPR applies to… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Several Clients have emailed a question to me this week (one even picked up that thing called a telephone, and called […]


Hardware Bugs Pose a Lasting Threat

By Vigilize - Last updated: Sunday, May 6, 2018

Newly disclosed vulnerabilities highlight a concerning security trend… An Article Review. Over the winter, the Meltdown and Spectre vulnerabilities called the security risk posed by hardware bugs to the attention of the public…as well as hackers and security researchers. In the months since, as a new article from TechCrunch details, four new major hardware vulnerabilities […]


Asking Out of Wallet Questions

By Vigilize - Last updated: Monday, April 30, 2018

The Movie for all Bank Employees

By Vigilize - Last updated: Monday, April 30, 2018

The Cost of Being Unprepared

By Vigilize - Last updated: Monday, April 30, 2018

A new study has identified the most profitable malware, showing just how much unprepared businesses have paid. An article review. Despite pleas from various experts and authorities, it looks like a significant number of organizations ultimately decide to pay the criminal organizations who have held their data hostage. That’s something that many people have probably […]


How Well Do You Know Your Endpoints?

By Vigilize - Last updated: Sunday, April 22, 2018

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically update and move on. That kind of hands-off approach has never ensured […]