<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

Solutions II Blog

Social Media Vulnerability

Posted by Matt Gourley on Feb 14, 2018 11:25:00 AM

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

Topics: Cybercrime, Service+Secure, Cybersecurity, IT Security, Vulnerability

To Click or Not To Click

Posted by Matt Gourley on Oct 25, 2017 12:00:00 PM

Cyber Security firms are innovating at a pace never seen before trying to keep with various attack vectors facing organizations and individuals alike. It’s no secret that cyber security is a lucrative area to be in, but what is really driving this huge market and will it ever slow down? The speed and sophistication of attacks that happen to corporate America are on the rise and businesses that once held the stance of “we’re not at risk of being hacked” are now admitting that it’s no longer a question of “if” but “when”. With these escalating concerns, businesses are forced to pay big bucks to security firms to help reduce their risk. They are also spending more on remediation of existing deficiencies as evidenced by this statistic and article from Business Insider: Cybersecurity is a $81.7 billion market - and startups are raking in the dough

Read More

Topics: Business Continuity, Security, Security Breach, Cybercrime

Security 101...Protect Your Digital Assets Because the Bad Guys are Winning!

Posted by Todd Bowling on Sep 21, 2017 11:30:00 AM

I am often asked (being in the business if IT security and cybercrime intel & defense) what can I do to prevent from being "hacked or breached"? I bet I get this question at least every other day and try to answer it to the best of my ability knowing that none of the questions or my answers are the same; similar? Yes, but identical? No. I also don't claim to be the "EXPERT" because I have met some of the best and brightest in this industry that fight this type of scourge on our behalf every day, from the cybercrime professionals at the FBI to those fighting cyber terrorism across numerous government and private agencies. To my astonishment I am also regularly amazed at the sheer lack of knowledge most people have when it comes to talking/understanding this topic given we have been hearing about it for years now. I do however, find a genuine "thirst" for learning about cybercrime and all of its offshoots. Unfortunately, this topic is complex and always on the morph. It is not easily "5-minute rice" or "Cliff Notes" addressable. So, let me start by discussing the most common, and likely most relevant, areas to begin a learning curve.

Read More

Topics: Business Continuity, Data Protection, Security, Security Breach, Cybercrime