Thank you to all that have participated in our Continuing Education Program.   Year to date, we have seen an 89% increase in the number of certifications completed using Continuing Education!   It’s great that so many of you have been proactive in your training! I am happy to announce that if you haven’t had a chance […]

One of the most common methods for distributing PC malware is the use of email spam messages that pose as tracking notifications from popular delivery companies such as DHL Express, FedEx, or UPS. The reason for this popularity is the malware’s effectiveness. Most of the time the victim receiving the message can’t resist opening the […]

It’s hard enough to keep pace with network demands and be able to detect threats in real time. It’s even harder to stay on top of all the information generated about those threats, intrusions and suspicious network behavior. Enter SIEM, Security Information and Event Management, which in an age of big data has become essential […]

As a society, we like I.D. cards. They are the manifestation of our trust that a person is who they say they are and that, yes, bartender, the possessor is old enough to enjoy a glass of cognac. But sometimes those I.D.s aren’t right. Sometimes they’re manipulated into stating things that aren’t true of the […]

There are rules and then there are rules for kids. A set of rules for school, another defined set at games, and a complete set of unwritten rules at home. But there is one field that our kids traverse almost daily, spending hours there at their own free will, mostly unsupervised—the cyber world. Yet few […]