Would you agree to sell your account password at home or at work? According to Investors Business Daily, 20% of you would based on a study by SailPoint which surveyed 1000 employees. … Continue reading
Ted Lloyd
Cloud collaboration, online storage, other cloud services and Bring Your Own Device (BYOD) adoption have all contributed to increased productivity and lower IT costs for most small businesses. Over half of companies surveyed now store data at a third party … Continue reading
Technology has managed to creep up on us and before we as a society have managed to alter our laws and societal norms, public space as we’ve known it for thousands of years has changed before our eyes.
While a business can never totally eliminate risk, there are three things which can be done about the risk: (1) Mitigate the risk, (2) accept the risk, or (3) transfer the risk. Larger companies have greater resources and access to … Continue reading
Link
Worst Passwords
The shocking fact is that this password does not change much from year to year. Read the report for 2015.

Entrepreneur.com had an interesting article of value to any business titled: “The Only 5 Ways You Can Become Rich.” One of those five points inspired me to think in terms of how how to become rich and stay rich. As … Continue reading
My hat is off to our politicians since as a general rule, they have an amazing gift of speaking without really conveying any substance. Simply watch any political speech or news conference and leave still having the questions unanswered despite … Continue reading

Just about every company involved in the cybersecurity industry is looking at artificial intelligence, (AI), as a means to win the war against cybercrime and address the human element which has been attributed to 70% of IT breaches. Many of … Continue reading

The Tor browser is enticing, because it is a fantastic tool for remaining anonymous on the Internet. We are constantly monitored and tracked at almost every site we visit, and of course, we never know when governments are snooping on … Continue reading
The security issue discovered last month with Juniper ScreenOS, (CVE-2015-7755) shatters the ageless wisdom of “if it isn’t broke, then don’t fix it.” In the wild age of cybercrime in which we live and do business, technology may still operate, … Continue reading