"With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to hackers, who had used high-level log-in credentials to access and plunder Verkada's vast camera network." - Washington Post . Last week's Verkada "hack" was not a hack. They...

In a recent article for HelpNetSecurity, TetherView's CEO Michael Abboud discusses the recent Cyberattack on a water plant in Oldsmar Florida, as well as the cybersecurity challenges faced by local municipalities throughout the US.   Read the full article here Follow Helpnetsecurity on Twitter ...

Key Person Dependency Risk is the threat posed to an organization by a team’s over-reliance on one or a few individuals. Generally, this Key Person or Key People have sole custody over critical institutional knowledge, creativity, reputation or experience that makes them indispensable to the organization’s...

As the COVID-19 outbreak continues to impact industries throughout the world, invest advisory and accounting firms have enabled employees to work remotely. While working from home may be nothing new to some, the realities of COVID have forced organizations to shift to a full-on work...

For the past 15 years, organizations have made a slow move towards enabling employees to work from home. One of the first enablement’s, was the 24/7 accessibility of laptops and cell phones. Workers were able to handle mission critical emails and calls—even on weekends. However,...

When it comes to streamlining operations and controlling costs, most companies are aware that cloud environments provide significant benefits over on-premises solutions. You can afford a more robust infrastructure, support mobility, and even increase security, all while lowering the expense associated with managing your IT...