Cybersecurity | Security | cyber threat
By:
Schellman
February 22nd, 2022
In his play Julius Caesar, Shakespeare famously portrays a soothsayer as warning Caesar to beware the Ides of March, forever giving the otherwise innocuous middle of the month a sinister cast.
Security | Compliance and Certification | ISO 27001 | ISO Certifications
By:
JORDAN HICKS
January 20th, 2022
For the hiking enthusiast, Colorado has a lot to offer–lots of peaks to climb of varying heights to suit athletes with different skill sets.
SOC 2 | SOC | Security | ISO 27001
By:
JORDAN HICKS
January 19th, 2022
Imagine you’ve been asked to renovate two kitchens. At the end, each of your two customers want to have a fully functioning room so you roll up your sleeves.
Cybersecurity | Security | Workforce
By:
Schellman
December 22nd, 2021
Maybe you’re ahead of the game, but in today’s day and age, more and more organizations are recognizing the inherent advantages to fostering a multigenerational workforce.
By:
AVANI DESAI
March 23rd, 2017
On 21 October 2016, something happened that could have been straight out of a science fiction movie. Many parts of the Internet, which we take for granted, stopped working. Twitter went down; Airbnb and Spotify were inaccessible. Even security expert Brian Krebs’s blog was shut down. It was as if the Internet had stopped working. What had occurred was a massive distributed denial-of-service attack (DDoS). The difference between this attack and most others is that instead of focusing the attack on an individual website, the focus was on a centralized service provided by the vendor, Dyn. Dyn offers services, including routing of incoming traffic, so that heavily used sites, such as Twitter, can offer better service to their visitors. The DDoS hackers took a hit-the-mothership approach to deliver a much more widespread impact, bringing down multiple websites.
By:
AVANI DESAI
January 9th, 2017
We all have our own ways of creating our perfect work environment.