Tariq Azmi | 2021-12-09

Title :Cyber Security Myths and Misconceptions

The volume of cybersecurity incidents is on the rise across the globe, but misconceptions continue to persist, including the notion that: Cybercriminals are outsiders. In reality, cybersecurity breaches are often the result of malicious insider .......Read More

Tariq Azmi | 2021-11-11

Title :Importance of Password

I am aware you are probably sick of hearing about making your password strong not to mention rules about those passwords. Protecting your credentials is one of the most important things you can do to defend yourself from ransomware and other cybera .......Read More

Tariq Azmi | 2021-10-11

Title :Cybersecurity Risks for Business

Cybersecurity Risks for Business Ransomware & Malware: According to Cybersecurity Ventures, Ransomware is predicted to hit $11.5 billion in damages.  The current threat volume translates into a new victim every 14 seconds. Ransomware h .......Read More

Tariq Azmi | 2021-09-09

Title :Technology Vulnerabilities and Threats

Introduction A threat and a vulnerability are not one and the same. A threat is a person or event that has the potential for impacting a valuable resource in a negative manner. A vulnerability is that quality of a resource or its environment that .......Read More

Tariq Azmi | 2021-08-10

Title :Back to School - Security Hygiene - Updated

Back to School & Security Hygiene During the covid the growth in technology use rose immensely, pre-COVID we (at least I) was concerned about screen time for the kids on the phone.  Last year and this year again some school have the optio .......Read More

Tariq Azmi | 2020-10-15

Title :CMMC Explained

In response to the growing number of cyber threats that continue threaten our national security, the Department of Defense (DoD) has implemented the Cybersecurity Maturity Model Certification (CMMC). This is to ensure that the Defense Industrial Base .......Read More

Tariq Azmi | 2020-09-10

Title :Security Question FAQ - Updated

Frequently Asked Questions from our webinars, cybersecurity educational seminar, and lunch and learns Now that most of the people have adjusted to working from home, Should the companies still be concerned about security of their data? Or Cyber S .......Read More

Jonathan Sanchez | 2020-07-10

Title :Considerations for a Remote Workforce - II

As the whole world is switching to work from home, we have put together few cyber hygiene practices all companies should implement and practice. Support Hotline - Non-technical people should not perform technical tasks; this could lead to eve .......Read More

Tariq Azmi | 2020-06-10

Title :COVID-19 & Opportunity for Cybercriminals to stea

Millions of Americans and businesses rejoiced when the Coronavirus Aid, Relief, and Economic Security Act was signed into a law last month. While this move by the government was praised by many, we in the Cyber Security community  have noticed a .......Read More

Tariq Azmi | 2020-05-10

Title :Password Delima

I know it is a pain remember all the One thousand password you have, from banking, Hulu, Netflix, your utility vendors. I know and I get it. But it is necessary don’t take the easy way out. I always thought asking users to have strong passwo .......Read More

Tariq Azmi | 2020-04-10

Title :Considerations for a Remote Workforce

Covid has forced us to adapt to changes in our personal and professional life.  When it comes to work related changes some of the companies are prepared for working remotely, others are not. Cyber criminals love crisis. First and foremost, S .......Read More

Jonathan Sanchez | 2020-03-10

Title :Call to Action* - Empowering KS Healthcare Provide

Coordination is under way. If you are interested email us at covidresponse@e2in.com or call (316)251-0015 x700 to help out! A Community Project to support our medical community, coordinated by EMBER TECHNOLOGIES, LLC is getting underway. Ember .......Read More

Tariq Azmi | 2020-02-15

Title :CMMC - Levels Overview

Quick Overview of CMMC Level 1-5 Level 1: Basic Cyber Hygiene includes 17 practices derived from NIST standards. Level 1 requires a performance-only approach to cybersecurity. These standards are basic cybersecurity practices most companies sh .......Read More

Tariq Azmi | 2020-01-14

Title :CMMC and DFARS

CMMC We have seen an increasing number of Cyberattacks, and ransomware in private and public sector. We also notice all the municipalities and city offices that were attacked in the last few years. Department of Defense and US government is increa .......Read More