February 2025 Newsletter

2025-02-05T08:48:39-08:00February 5th, 2025|

We recently encountered a situation with a client whose close relative had passed away, leaving behind a locked iPhone. The family sought access to sentimental and potentially significant digital assets like photos and videos, stored behind a six-digit PIN, as well as messages and location history to identify activities just preceding the death. Older iPhones […]

13 Sneaky Ways FBI Agents Protect Their Homes

2019-03-26T16:04:40-07:00April 18th, 2018|

Who better to get advice on home protection than FBI agents who have studied and observed the minds of criminals? Even better? These home security tips are totally doable!

“Oftentimes, crime can be discouraged by the mere presence of an alert neighbor,” says Douglas Kane, president of Risk Control Strategies and a 27-year veteran of the […]

Lawmakers seek OSHA standard on workplace violence prevention in health care

2019-03-26T16:04:40-07:00April 18th, 2018|

March 14, 2018

Washington — Rep. Ro Khanna (D-CA) and 12 other House Democrats have introduced legislation intended to curb workplace violence in health care facilities.

The Health Care Workplace Violence Prevention Act, introduced March 8, would direct OSHA to create a standard that would require health care facilities to develop and implement facility- and unit-specific workplace […]

What Happens on the Dark Web Doesn’t Always Stay on the Dark Web

2019-03-26T16:04:40-07:00March 9th, 2018|

The dark web is a strange and confusing place that most people have heard about, typically via passing headlines about drug kingpins and illegal Bitcoin transactions. Unfortunately, the dark web is a very real place, mostly operating off the radar of mainstream security infrastructures. Because most people are law-abiding citizens, it can be […]

The New NIST Guidelines: We Had it All Wrong Before

2019-03-26T16:04:40-07:00January 8th, 2018|

Passwords are an essential part of online security measures. The push in recent years was to make passwords more complex with added characters and numbers, and had been lauded first as a crucial, and then became an oft-required layer of security.

Those guidelines were issued by The National Institute of Standards […]

Why Don’t More Companies Use Multi-Factor Authentication?

2019-03-26T16:04:40-07:00November 6th, 2017|

The world is a lot smaller these days, with an ever-increasing interconnectedness. With this ease of connection, digital sharing, and online transactions, more and more sensitive data is exchanged. Yet, with the prevalence of data breaches in the news lately, it’s surprising that many companies are complacent about the level of security afforded […]

Load More Posts
Go to Top