All electric and self-driving car technology fascinates me. As a race car driver, I can see that we are not too far away from the time where the computers and software will lap the car faster and better [...]
About Oli ThordarsonThis author has not yet filled in any details.
So far Oli Thordarson has created 14 blog entries.
Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile SecurityIn its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as well [...]
Kevin McDonald has just published his latest article of DFARS (Defense Federal Acquisition Regulations Supplement) at SearchCompliance.TechTarget.com.If you fall into this category, a recently implemented rule from the Department of Defense called the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 [...]
Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority.He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" or [...]
Irvine, CA - IT solution providers have never been a shy bunch. In this article by CRN - Solution Providers Cheer Trump Tech Summit, Hoping It Will Help Channel Partners Create More Jobs, many share their thoughts on where our president-elect [...]
If you are handling PII (Personally Identifiable Information) for your clients or anyone else you should read this article. It is delivered in the context of a sweepstakes type of program, but it is applicable to anyone handling PII. The [...]
Kevin McDonald guest writes a blog for Dave Berkus' BerkonomicsTUESDAY, June 21st, 2016 Don’t go on a phishing trip!By Kevin McDonaldPhishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively [...]
As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice.It seems that not a day passes without news of another high-profile hack, embezzlement [...]
Ian makes several very important points including, “Whether it is your home computer or a large organization’s network, ransomware does not care. It will block access to the computer, encrypt your data and if that computer has access rights to the network, then it will lock down the entire network and hold it all hostage.” Additional he says “The threat of ransomware will continue to grow because cybercriminals recognize it as a profitable business model and the online payment methods afford anonymity.”
If you want to read more about ransomware and how to protect you and your company, check out these links:
1) Attend free our live lunch and learn on How to Protect You and Your Company from Ransomware. Whether you have already gotten ransomware or have yet to be infected, this is a must attend event. In 90 minutes you will come away with a rich set of action items to be better prepared. Ransomware Lunch & Learn
Here is a news column featuring Alvaka/Noloki EVP and security expert, Kevin McDonald. It’s a business owner’s worst nightmare.You arrive for work, sit down at your computer and find that you can’t access any of your files because cyber criminals have [...]