About Oli Thordarson

This author has not yet filled in any details.
So far Oli Thordarson has created 14 blog entries.

When is the driverless car arriving for you?

All electric and self-driving car technology fascinates me. As a race car driver, I can see that we are not too far away from the time where the computers and software will lap the car faster and better [...]

2021-10-05T01:12:54-07:00August 4th, 2017|

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as [...]

2020-04-08T23:06:51-07:00March 8th, 2017|

Aligning IT and compliance procedures increasingly a business priority

Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority. He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" [...]

2020-04-08T23:10:49-07:00January 19th, 2017|

Data Privacy: What are the Risks?

If you are handling PII (Personally Identifiable Information) for your clients or anyone else you should read this article. It is delivered in the context of a sweepstakes type of program, but it is applicable to anyone handling PII. The [...]

2019-12-13T12:55:26-08:00August 25th, 2016|

Don’t go on a phishing trip!

Kevin McDonald guest writes a blog for Dave Berkus' Berkonomics TUESDAY, June 21st, 2016 By Kevin McDonald Phishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively impacting individuals and [...]

2024-10-09T05:03:31-07:00June 21st, 2016|

Orange County Register Opinion Column on “Ransomware: Pay now or pay later”

Ian makes several very important points including, “Whether it is your home computer or a large organization’s network, ransomware does not care. It will block access to the computer, encrypt your data and if that computer has access rights to the network, then it will lock down the entire network and hold it all hostage.” Additional he says “The threat of ransomware will continue to grow because cybercriminals recognize it as a profitable business model and the online payment methods afford anonymity.”

If you want to read more about ransomware and how to protect you and your company, check out these links:

 1)    Attend free our live lunch and learn on How to Protect You and Your Company from Ransomware. Whether you have already gotten ransomware or have yet to be infected, this is a must attend event. In 90 minutes you will come away with a rich set of action items to be better prepared. Ransomware Lunch & Learn

2)  Here is the Ransomware defense framework for P-D-R, Protect, Detect and Recover.

2019-12-13T12:58:24-08:00April 22nd, 2016|