by Design Lead | Jan 7, 2022 | Malicious Bots
How to (Not) Get Hundreds of Burner Numbers By Brennan Whitfield January 7, 2022 How disposable is a phone number? Imagine you are an employee assigned to direct a spam attack against a competitor company’s website. Your initiative is to overwhelm the website’s...
by Design Lead | Jan 5, 2022 | Compliance
How SSO Makes Being HIPAA Compliant Easier By David Olukoju January 5, 2022 The HIPAA and HITECH acts help to protect PHI in the event of a breach. They are sets of regulations and laws that determine how Private Health Information (PHI) is disclosed and safeguarded....
by Design Lead | Dec 17, 2021 | Cybersecurity & Risks
What is Cyber Spying? By Brennan Whitfield December 17, 2021 When presented with the term “spying”, what comes to mind? You may picture someone lurking in a dark alley, or blending into a crowd, watching a target from afar to document their every move. Within the...
by Design Lead | Dec 15, 2021 | Cybersecurity & Risks
5 Privacy Steps for Better Cyber Security By Ricardo Flores December 15, 2021 In the digital world, security and privacy are two very different topics. The first topic protects data from non-authorized access, while the second deals with protecting sensitive...
by Design Lead | Dec 10, 2021 | Cybersecurity & Risks
The Do’s and Don’t’s of Cyber Security: Passwords By Ricardo Flores December 10, 2021 Are you one of those people whose password is the same everywhere? How about having “hello123” or something straightforward as “password” or...