“IGNITING INNOVATION GALVANIZING STRATEGIES”
Tariq Azmi | 2021-12-09
Title :Cyber Security Myths and Misconceptions
The volume of cybersecurity incidents is on the rise across the globe, but misconceptions continue to persist, including the notion that:
Cybercriminals are outsiders. In reality, cybersecurity breaches are often the result of malicious insider .......Read More
Tariq Azmi | 2021-11-11
Title :Importance of Password
I am aware you are probably sick of hearing about making your password strong not to mention rules about those passwords. Protecting your credentials is one of the most important things you can do to defend yourself from ransomware and other cybera .......Read More
Tariq Azmi | 2021-10-11
Title :Cybersecurity Risks for Business
Cybersecurity Risks for Business
Ransomware & Malware:
According to Cybersecurity Ventures, Ransomware is predicted to hit $11.5 billion in damages. The current threat volume translates into a new victim every 14 seconds. Ransomware h .......Read More
Tariq Azmi | 2021-09-09
Title :Technology Vulnerabilities and Threats
Introduction
A threat and a vulnerability are not one and the same. A threat is a person or event that has the potential for impacting a valuable resource in a negative manner. A vulnerability is that quality of a resource or its environment that .......Read More
Tariq Azmi | 2021-08-10
Title :Back to School - Security Hygiene - Updated
Back to School & Security Hygiene
During the covid the growth in technology use rose immensely, pre-COVID we (at least I) was concerned about screen time for the kids on the phone. Last year and this year again some school have the optio .......Read More
Tariq Azmi | 2020-10-15
Title :CMMC Explained
In response to the growing number of cyber threats that continue threaten our national security, the Department of Defense (DoD) has implemented the Cybersecurity Maturity Model Certification (CMMC). This is to ensure that the Defense Industrial Base .......Read More
Tariq Azmi | 2020-09-10
Title :Security Question FAQ - Updated
Frequently Asked Questions from our webinars, cybersecurity educational seminar, and lunch and learns
Now that most of the people have adjusted to working from home, Should the companies still be concerned about security of their data? Or Cyber S .......Read More
Jonathan Sanchez | 2020-07-10
Title :Considerations for a Remote Workforce - II
As the whole world is switching to work from home, we have put together few cyber hygiene practices all companies should implement and practice.
Support Hotline - Non-technical people should not perform technical tasks; this could lead to eve .......Read More
Tariq Azmi | 2020-06-10
Title :COVID-19 & Opportunity for Cybercriminals to stea
Millions of Americans and businesses rejoiced when the Coronavirus Aid, Relief, and Economic Security Act was signed into a law last month. While this move by the government was praised by many, we in the Cyber Security community have noticed a .......Read More
Tariq Azmi | 2020-05-10
Title :Password Delima
I know it is a pain remember all the One thousand password you have, from banking, Hulu, Netflix, your utility vendors. I know and I get it. But it is necessary don’t take the easy way out.
I always thought asking users to have strong passwo .......Read More
Tariq Azmi | 2020-04-10
Title :Considerations for a Remote Workforce
Covid has forced us to adapt to changes in our personal and professional life. When it comes to work related changes some of the companies are prepared for working remotely, others are not. Cyber criminals love crisis.
First and foremost, S .......Read More
Jonathan Sanchez | 2020-03-10
Title :Call to Action* - Empowering KS Healthcare Provide
Coordination is under way. If you are interested email us at covidresponse@e2in.com or call (316)251-0015 x700 to help out!
A Community Project to support our medical community, coordinated by EMBER TECHNOLOGIES, LLC is getting underway.
Ember .......Read More
Tariq Azmi | 2020-02-15
Title :CMMC - Levels Overview
Quick Overview of CMMC Level 1-5
Level 1: Basic Cyber Hygiene includes 17 practices derived from NIST standards. Level 1 requires a performance-only approach to cybersecurity. These standards are basic cybersecurity practices most companies sh .......Read More
Tariq Azmi | 2020-01-14
Title :CMMC and DFARS
CMMC
We have seen an increasing number of Cyberattacks, and ransomware in private and public sector. We also notice all the municipalities and city offices that were attacked in the last few years. Department of Defense and US government is increa .......Read More