by Carson & SAINT Admin | Jul 28, 2015 | Security & Protection
Why is Security Important to the SDLC? SDLC stands for the Software Development Lifecycle and is used to refer to the process of developing a software product. It is extremely vital to keep security in mind during every step of the process, or as we in the...
by Carson & SAINT Admin | Jul 22, 2015 | Cybersecurity 101
Two-Factor authentication, or 2FA, is a small step that will go a long way in protecting your online accounts. 2FA will provide a second layer of protection to your information and should be used whenever possible at home and work. When a user enables 2FA, they are...
by Carson & SAINT Admin | Jul 16, 2015 | Cybersecurity 101
Something (or someone) is always trying to get into your network. There are APTs, hackers, phishing, data breaches, penetration tests, and vulnerability exploit. But if you’re not in the industry that may have all sounded like a foreign language. Carson Inc. wants to...
by Carson & SAINT Admin | Jun 10, 2015 | Internet of Things, Security & Protection
Due to the highly networked nature of the devices, security needs to be incorporated within the development of the Internet of Things (IoT). Recommendations for security with IoT revolve around training employees, keeping unauthorized users from gaining access, and...
by Carson & SAINT Admin | Jun 3, 2015 | Internet of Things
Phones, computers, laptops, televisions, door locks and even refrigerators can connect to the Internet. With so many devices talking to one another, there is a constant stream of information being shared. But, is there a price for all these devices being...
by Carson & SAINT Admin | May 27, 2015 | Internet of Things
It seems everything is connecting to the Internet – from cars to refridgerators to lawn mowers. The future of machine-to-machine technology seems inevitable. People are continuing to demand smarter applications and devices to fulfill their growing hunger for constant...
by Carson & SAINT Admin | May 20, 2015 | Attacks Breaches & Hacks
With the proliferation of the Internet, users are constantly on devices that contain a lot of their personal information. And now, with technologies like iCloud and other password storage methods, hackers can gain access to that information through social engineering....
by Carson & SAINT Admin | May 13, 2015 | Cybersecurity, Why Security Matters
Information is arguably an organization’s greatest asset, yet strategies and controls implemented to guard that information continues to remain sub-par. Even organizations that do have adequate security controls do not have an incident response implemented to...
by Carson & SAINT Admin | Apr 8, 2015 | Happening Now
As of Wednesday, April 1, 2015, President Obama signed an executive order for cyber security sanctions. This order follows the order signed in February for unity in cybersecurity. The new sanctions will take action against cyber-attackers that threaten the United...
by Carson & SAINT Admin | Mar 18, 2015 | Why Security Matters
Today, the IT professional has a plethora of technology tools at his or her disposal. Each of these tools can solve complex problems; whether the focus is security, systems administration, networking, etc., the choices are endless. Embedded devices are one of the...