Blog

/Blog

Cyber Warfare – the threat to businesses

 Is Cyber Warfare Our Vulnerable Point in 2013?
The threat of being hacked for a hacker’s personal gain has been eclipsed with the advent of Nation States sponsored hacking factories. There is a growing concern that the next major war will include sophisticated Cyber warfare techniques and weapons. It makes sense.  The USA, China and Russia […]

By |January 9th, 2013|Blog|Comments Off on Cyber Warfare – the threat to businesses

Closing Door on a Cyberheist, Opening Door for Cyber Self Governance

…a story of a cyberheist concludes…or does it?

“Thank you, Marie” said Veronica. “We also want you to know that we have obtained a new solution called LT Auditor+ that will allow us to more effectively minimize today’s cyber threats with powerful, proactive self governance.”

“Would it be alright if I am here when Mr. Burrough returns?” […]

By |January 3rd, 2013|Blog|Comments Off on Closing Door on a Cyberheist, Opening Door for Cyber Self Governance

Conflicting Cyber Security Data Could Cause You to Fire Wrong Employee

 

a story of a cyberheist continues…

When Karun entered the IT floor, he found not only Veronica, but her entire staff waiting for him in the floor conference room.

 

“Hello Karun,” said Veronica. “We have been hard at work to see what happened to the Parker account and wanted to let you know what we have found.”

“Tina […]

By |December 16th, 2012|Blog|Comments Off on Conflicting Cyber Security Data Could Cause You to Fire Wrong Employee