Life’s a Breach

It’s very likely that some of your most sensitive information is vulnerable, out there just for the taking. “How is that possible?” You may ask. “I have 2-factor authentication configured on all of my social and business accounts!”. Indeed, the information you manage may be secure, but what about sensitive information pertaining to you, but…

Telemedicine Is Here to Stay!

The New Normal? Telemedicine has allowed the medical establishment to provide services to patients during a time where a furious demand to shift human-to-human contact to the digital realm exists. For most patients, telemedicine seems so new and novel, but the telehealth infrastructure to provide medical services remotely has been growing quietly for the past…

Virtual Reality Adversaries Are On The Prowl

Virtual Reality Hacking

Unwelcome Guests The frequency, potency, and sophistication of cybersecurity threats continue to surge. Any business which employs digital technology, which is to say all businesses, is vulnerable to the attacks of an assortment of rogue digital adversaries, from individual “hackers” (a misnomer we will confront and clear up) to networks of dissident programmers bound together…