Blog 2017-04-14T15:59:59+00:00

Call to Action for Security in 2015

2014 proved to be a very challenging year for many corporations from a security perspective. Look no further than some of the entities listed below that made a wave in the news headlines. P.F. Chang – 33 restaurants compromised Sally Beauty – 25,000 payment cards compromised Michaels Stores – Roughly 3 million debit and credit cards were compromised Goodwill Industries – Nearly 330 locations and some 868,000 cards compromised Jimmy John’s – 216 stores throughout the nation, compromised Neiman Marcus – An estimated 350,000 payment cards compromised The Home Depot – A whopping 56 million cards were compromised Target Corporation – A jaw-dropping number, an estimated 70 million cards were compromised JPMorgan Chase – An estimated 76 million small businesses

Avoid Storing Passwords Using Internet Browsers

If you are currently using your internet browser (Internet Explore, Firefox or Google Chrome) to store passwords, you should consider watching this video. It is so easy for anyone to sit down at your computer and compromise your website passwords within seconds. Go to to watch more videos on how to protect yourself.

BEWARE: ISP Tech’s using your Internet

I was out in public the other day and I overheard something that was quite concerning. There were two guys talking to each other who both work for a ISP (Internet Service Provider). They were discussing back and forth about how easy it is to download “questionable” stuff from the Internet by using customer’s wireless networks. By questionable stuff, I am talking about porn, illegal music and movies. They said that all they have to do is go into any neighborhood that is serviced by the same ISP, and simply park their service vehicle on a street and open up their laptop. From there, they are able to connect to any number of wireless networks. The ISP technicians are able

Facebook Location History

Many of you are probably not aware that Facebook is tracking more information about you than you think. I find it a bit ironic that so many people were really upset with the NSA for collection of personal information on people. However, people don't realize that the very same applications they are using on their own mobile device are collecting the same (if not more) personal/private information. Take for example, Facebook - there is a a feature that tracks your location and keeps a history of the places you visit each day. This feature is enabled by default and can be disabled. However, the point is that the several applications installed on your phone are collecting this personal data without