Our Thoughts On Archive

Sort by

Categories
Authors

Sean Thomas

Articles 1 - 4 of 4

Where Cybersecurity and Fiduciary Responsibility Meet

Learn about important cybersecurity threats and best practices plan sponsors need to consider with vendors and providers to maintain cybersecurity.

Is Your Chip Card Implementation Secure?

Learn about the benefits of EMV cards including the fact it is difficult to clone and effective at preventing fraud.
Cybersecurity
Sean Thomas | 10.11.2019

Vulnerability Scanning versus Penetration Testing

When organizations look to assess the resiliency of their information systems, there tends to be some confusion around what exactly vulnerability scanning

Ransomware Still a Growing Problem for Organizations of All Sizes

While the concept of malware-based extortion has remained relatively unchanged since the first documented occurrence in 1989, attackers have spent the
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh