Are your Application Programing Interfaces (API) Secured?
Today we delve into the world of Application Programing Interface or “API” security. These interfaces are typically used to share information between applications, such as a CRM like Salesforce and mobile applications that your sales team may want to use. These are sets of tasks and instructions prebuilt into Salesforce that you can ‘call’ to… (0 comment)

How Expensive is Effective Cybersecurity?
There is almost no limit to how much you could spend on cybersecurity solutions, and with Gartner estimating global spend on security is equal to about 1.5% of worldwide revenue – does that mean that effective cybersecurity has to be expensive? And what is “expensive”? Surely that is different for an SMB client than a… (0 comment)

CASE STUDY: The unique complexity of cyber security municipalities and governments
The challenges: Municipalities and governments find themselves in an interesting situation as often the IT and information security departments are a generic city or county service, however based on the numerous departments they support they have very nuanced information security requirements. In addition the goal is always to cut down on taxpayer burden so they… (0 comment)

Special Directive on Domain Name System (DNS) Compromise
Last week the USA’s Department of Homeland Security (DHS) sent out a directive for all agencies to upgrade their Domain Name System (DNS) security in light of a wave of Iranian hack attempts specifically targeted at compromising DNS. The compromise The Iranian cyber-criminals attempted (it’s unknown if they succeeded), to figure out through DNS records… (0 comment)