How to (Not) Get Hundreds of Burner Numbers By Brennan Whitfield January 7, 2022 How disposable is a phone number? Imagine you are an employee assigned to direct a spam attack against a competitor company’s website. Your initiative is to overwhelm the website’s...
How SSO Makes Being HIPAA Compliant Easier By David Olukoju January 5, 2022 The HIPAA and HITECH acts help to protect PHI in the event of a breach. They are sets of regulations and laws that determine how Private Health Information (PHI) is disclosed and safeguarded....
What is Cyber Spying? By Brennan Whitfield December 17, 2021 When presented with the term “spying”, what comes to mind? You may picture someone lurking in a dark alley, or blending into a crowd, watching a target from afar to document their every move. Within the...
5 Privacy Steps for Better Cyber Security By Ricardo Flores December 15, 2021 In the digital world, security and privacy are two very different topics. The first topic protects data from non-authorized access, while the second deals with protecting sensitive...
The Do’s and Don’t’s of Cyber Security: Passwords By Ricardo Flores December 10, 2021 Are you one of those people whose password is the same everywhere? How about having “hello123” or something straightforward as “password” or...