Blog Posts

The Dangers of Password Walking

The term “password walking” refers to passwords formed from keys located close to each other on a keyboard. Many people use passwords like this because they are convenient to enter and remember. But these types of passwords, while they provide some protection, are far...

The Customer Experience

The importance of the customer experience in an industry that is not typically known for its warmer customer focus is the reason why former Dell CIO, Jerry Gregoire, called the customer experience “the next competitive battleground.” There are a number of reasons why...

Securing your iCloud

As the popularity and use of Apple’s technologies increase, the importance of iCloud security increases as well. The iCloud is a cloud computing service that allows users to store data such as documents, photos, and audio on remote servers for download to other...

Malicious Apps and How to Protect Your Data

Smart phones have been rising steadily in popularity, and are now used to access the internet more often than desktop computers. Android has become the most popular operating system in use worldwide. Hackers are aware of its popularity, of course, so naturally more...

RedLegg: Servicing Clients from the Beginning

Who we are, what we’ve been up to, and where we’re going Why ‘redleg’? The term “redleg” (one g) was coined during the American Civil War, and referred to the two-inch scarlet stripe that was sewn onto each pant leg of a Field Artillery soldier’s uniform. Artillery...

Hunting Down Phishing Sites

Rapid Reporting of Industry-Specific Threats Just how many phishing threats does your organization or industry face at any one time? What about daily and monthly identification, reporting, and steps for mitigation? The current threat landscape can be overwhelming:...

The Evolution of Drive-By Cyberattacks

Staying safe in the wireless world By: Intern Cassandra Knapp-Mason From Dial-Up to Wireless The early days of the internet, where dial-up connectivity was the norm, are gone for most users around the world. Even though some two million US users may still pay AOL for...

Perils of Password Reuse

In 2017 there were nearly 150 million user accounts exposed in security breaches, an astounding number! Research indicates that 99% of these compromised user accounts implemented password reuse, using the same password for other accounts elsewhere on the internet....

Securing Wireless Networks

This week, we want to talk about securing Wireless Networks. Wireless communications have become nearly ubiquitous, but despite the rapped growth of their acceptance, the knowledge to secure those networks has been greatly ignored. We still see many home networks...