Blog

Featured Posts

Fingerprint
Blog

The Data Directive: Protecting Your Website in an Ever-Changing Regulatory Environment

With the onset of data analytics software and technology that tracks customer behavior, organizations today have more information about their customers than ever before.

Fingerprint
Blog

5 Steps to Surviving a Drupal Site Data Breach

It happened—your Drupal site was hacked and your customers’ information has been compromised. This occurs more often than most companies would like to admit. It’s estimated that in 2018, more than 4.5 billion records were exposed as a result of data breaches.

Phishing
Blog

Sound Phishy? Legit VS Phishing Emails

To help you get a better sense of the danger phishing poses, let’s take a detailed look at the history of these scams, what they entail, and how you can protect yourself against them.

Blog

Top 5 Ways to Reduce Atlassian Security Stress

Security stress can become paralyzing, and inhibit your ability to make decisions because you’re no longer in balance or control. 

Blog

Does Covering your Webcam Make You Paranoid or Proactive?

Webcams are now a staple for our laptops, tablets, and even our phones. As with every aspect of our technologically-inclined society, webcams are not as unassuming as they seem.

Blog

The Top 10 Tips for Atlassian Security & Compliance

Don West of Contegix shares 10 tips to keep your Atlassian instances secure and compliant.

Blog

The 3 Forms of Authentication & How We Use Them

Authentication is a security process that began long before the age of computing.  Only in our current parlance, does it seem linked to our personal digital security.

Solid Disks vs Hard Disks
Blog

Do Solid State Drives Fail More Often Than Hard Disks?

SSDs are growing more in popularity everyday. Their speed is now not the only thing they have in their favor.