Security layers are Security Best practice. No one type of security provides a complete security solution. This report focuses on network segmentation. The separation of critical networks from the Internet and other internal, less sensitive […]
Managing Remote Workers during COVID-19

During the COVID-19 Pandemic, many companies have been required to set-up their employee base to work remotely. This includes not only employees, but also contractors, business partners, vendors, and other users to perform work from […]
Getting Ready for GDPR – A Critical Activity Checklist
The implementation deadline for the European Union General Data Protection Regulation (GDPR) is coming soon. Most of us in the US are probably not yet ready for the potential business impact of the new European […]
A Personal Data Checklist for Data Protection Day
Check out Danielle’s related post for small- to medium-sized enterprises. January 28th is Data Protection Day in the United States and Europe. The celebration of this day is the anniversary of “the signing of the […]
Protecting Your Business on Data Protection Day
Check out Danielle’s related post for individuals and families. January 28th is Data Protection Day in the United States and Europe. The celebration of this day is the anniversary of “the signing of the Council […]
Nicehash Confirms Theft of Bitcoin
Nicehash, the cryptocurrency mining company, has confirmed the theft of over 4,736.43 Bitcoin, worth over $75 million at today’s prices. What We Know On Wednesday, December 6th, the Nicehash team reported that someone had compromised their […]
Security Tech Today: Monero

From time to time, we at SCS like to discuss newer or lesser-known security technologies, bringing them into the light to use them – or to protect against them. Today, we’ll be discussing Monero. What […]
The KRACK Attack

The KRACK Attack Researchers out of KU Leuven recently disclosed a major vulnerability in the WPA2 protocol. The attack, known as KRACK, works by forcing the victim to reinstall an already-used key. By replaying message […]
Patient Records Exposed in New Breach
Patient Health Records Exposed The fun never ends in the cybersecurity world. Researchers at Kromtech Security Researchers recently disclosed the existence of yet another insecure AWS server. This time, the server stored the most sensitive […]