<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

Solutions II Blog

Social Media Vulnerability

Posted by Matt Gourley on Feb 14, 2018 9:25:00 AM

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

Topics: Cybercrime, Service+Secure, Cybersecurity, IT Security, Vulnerability

Thirty-Eight Minutes of Panic

Posted by Jeff Robbins on Feb 1, 2018 1:02:00 PM

For thirty-eight minutes, citizens and visitors of the island of Oahu, HI lived in a state of panic. Emergency broadcast systems sent the following message to cell phones across the island: “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL.”

Read More

Topics: Cybersecurity, IT Security, Vulnerability

What You Need to Know About "Spectre" and "Meltdown"

Posted by Solutions II on Jan 10, 2018 10:10:00 AM

In recent days, you have most likely seen news stories about the "Meltdown" and "Spectre" vulnerabilities in many modern processors. Solutions II is aware of these issues, and we are watching the situation closely as we work with our partners to help you formulate the best plan of action to safeguard your infrastructure.

Read More

Topics: Security, Service+Protect, Service+Secure, IT Security, Vulnerability