About Oli Thordarson

This author has not yet filled in any details.
So far Oli Thordarson has created 14 blog entries.

When is the driverless car arriving for you?

All electric and self-driving car technology fascinates me. As a race car driver, I can see that we are not too far away from the time where the computers and software will lap the car faster and better [...]

When is the driverless car arriving for you?2017-08-06T23:40:59+00:00

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile SecurityIn its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as well [...]

CRN’s story on the CIA Wikileaks leak2017-05-25T15:17:57+00:00

DFARS 252.204-7012 is going to define new winners and losers in defense contracting

Kevin McDonald has just published his latest article of DFARS (Defense Federal Acquisition Regulations Supplement) at SearchCompliance.TechTarget.com.If you fall into this category, a recently implemented rule from the Department of Defense called the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 [...]

DFARS 252.204-7012 is going to define new winners and losers in defense contracting2017-05-25T15:17:57+00:00

Aligning IT and compliance procedures increasingly a business priority

Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority.He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" or [...]

Aligning IT and compliance procedures increasingly a business priority2017-05-25T15:17:57+00:00

IT solution providers speak out on the Silicon Valley/Trump Summit meeting

Irvine, CA - IT solution providers have never been a shy bunch. In this article by CRN - Solution Providers Cheer Trump Tech Summit, Hoping It Will Help Channel Partners Create More Jobs, many share their thoughts on where our president-elect [...]

IT solution providers speak out on the Silicon Valley/Trump Summit meeting2017-05-25T15:17:58+00:00

Data Privacy: What are the Risks?

If you are handling PII (Personally Identifiable Information) for your clients or anyone else you should read this article. It is delivered in the context of a sweepstakes type of program, but it is applicable to anyone handling PII. The [...]

Data Privacy: What are the Risks?2017-11-13T07:22:40+00:00

Don’t go on a phishing trip!

Kevin McDonald guest writes a blog for Dave Berkus' BerkonomicsTUESDAY, June 21st, 2016 Don’t go on a phishing trip!By Kevin McDonaldPhishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively [...]

Don’t go on a phishing trip!2017-05-25T15:17:58+00:00

Without IT process documentation, companies risk being held ‘hostage’ by IT

As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice.It seems that not a day passes without news of another high-profile hack, embezzlement [...]

Without IT process documentation, companies risk being held ‘hostage’ by IT2017-05-25T15:17:58+00:00

Orange County Register Opinion Column on “Ransomware: Pay now or pay later”

Ian makes several very important points including, “Whether it is your home computer or a large organization’s network, ransomware does not care. It will block access to the computer, encrypt your data and if that computer has access rights to the network, then it will lock down the entire network and hold it all hostage.” Additional he says “The threat of ransomware will continue to grow because cybercriminals recognize it as a profitable business model and the online payment methods afford anonymity.”

If you want to read more about ransomware and how to protect you and your company, check out these links:

 1)    Attend free our live lunch and learn on How to Protect You and Your Company from Ransomware. Whether you have already gotten ransomware or have yet to be infected, this is a must attend event. In 90 minutes you will come away with a rich set of action items to be better prepared. Ransomware Lunch & Learn

2)  Here is the Ransomware defense framework for P-D-R, Protect, Detect and Recover.

Orange County Register Opinion Column on “Ransomware: Pay now or pay later”2017-12-07T07:38:18+00:00
Load More Posts