Secure Call
Controlled Unclassified Information: What DoD Contractors MUST Know About CUI – Part 2
As previously stated in part one of our two part series on Controlled Unclassified Information, if your business is going to be using mobile phones on a regular basis, secure mobile communications is always a topic that needs to be in the forefront of your mind. The penalties for DoD contractors in terms of CUI…
Read MoreControlled Unclassified Information: What DoD Contractors MUST Know About CUI – Part 1
According to the Department of Defense, Controlled Unclassified Information (also referred to as CUI) is any unclassified information or other data that meets the standards for both security and distribution controls that is applicable to statute and government-wide policies under Executive Order 13556. Previously, this type of information was commonly referred to as Sensitive But…
Read MoreIs your phone call private?
Is your phone call private? Can someone else listen in on voice conversations that you have over your mobile phone? The answer you’ll get from your mobile phone provider might not make you happy. In this article we will walk you through how private your normal phone calls actually are. Are You Sure Your Phone…
Read More5 Things You Need to Make a Secure Call
If how to protect and make a secure call has been on your mind recently, you’re not alone! If you’re going to secure your calls, you need an application or service you can trust. Today we’ll review five things the app and secure call service need to have, which are: Platform End to End Encryption…
Read MoreSecure Calling App : What You Need to Know
You need a secure calling app, but it’s hard to know which one to choose. This article will walk you through what you need to know and how to evaluate your choices. What’s Important: End-to-End Encryption Verification of Encryption Platform Reliable Connection Regional Servers for Low Latency Easy Contacts End-to-End Encryption End-to-End Encryption is the…
Read MoreCyber Security Threats for 2018 : What to Expect
Last year the top cyber security threats changed dramatically. And 2018 will be no different. Except we are going to see even craftier ways for hackers to make money off of you! Below we will predict and discuss the new threats you will encounter in 2018: Money vs Mayhem Browser based Crypto Currency Miners Ransomware…
Read MoreWhy you need Encrypted Text Messaging
At this point I think we’re all aware: Every text message and picture you send is vulnerable for someone to see, and there’s nothing you can do about it. Or is there? Messages, pictures and files can be encrypted directly to the other user’s phone, if you know what to use. In this post, we’ll…
Read MoreIntrusion Detection Software: Should I go Open Source, Appliance or Managed Service
You know you need Intrusion Detection Software (IDS) or Intrusion Prevention Software (IPS). The question is which IDS/IPS Solution is right for your Organization? You can use a “Free” open source tool, buy an expensive appliance, or just contract a managed service. How do you choose? Intrusion Detection Questions In this article, we provide a…
Read MoreVulnerability Scan: But I Have Patch Management, Why Do I Need a Scan?
“I don’t need a vulnerability scan of our network, everything is patched. We have patch management!” Have you thought those words, even said them aloud? Too many cyber security terms are thrown around these days, their meaning confused and watered down. In this case, what you don’t know CAN hurt you. Patch Management Works, Where…
Read MoreCyber Security Plan: I know I need one, but where do I start?
Hackers, Ransomware, Regulations, and Compliance. Executives across the US find these terms creeping into their daily reading. Question is, when will they have real impact for you and your business? You know you need to start taking cyber security seriously, but it feels like one more money pit for IT. Worst yet, none of your…
Read More