Skip to content
  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

O'Mard Consulting Services, LLC

Plan, Execute, Win, Repeat!

Category: Cyber Security

Cybersecurity at Home – 3 Simple Steps You Can Take to Secure Your Home!

Posted on October 10, 2022October 8, 2022 by Jeremy

KEY POINTS A University of Maryland study concluded that a cyber-attack happens every 39 seconds. Social engineering is one of… Read more Cybersecurity at Home – 3 Simple Steps You Can Take to Secure Your Home!

One Simple Step You Can Take to Secure Your Online Accounts!

Posted on December 21, 2021December 15, 2021 by Jeremy

KEY POINTS The Telesign Consumer Account Security Report identified that 54% of online shoppers use five or fewer passwords across… Read more One Simple Step You Can Take to Secure Your Online Accounts!

3 Smart Device Security Tips to Live By!

Posted on October 25, 2021October 22, 2021 by Jeremy

KEY POINTS It is projected that there will be 30 billion internet connected devices worldwide by 2025! The Broadband Forum… Read more 3 Smart Device Security Tips to Live By!

3 Things You Can Do To Keep Your Personal Information Safe!

Posted on October 18, 2021October 14, 2021 by Jeremy

KEY POINTS The FTC received 4.8 million identity theft and fraud related reports in 2020, a 45% increase from 2019!… Read more 3 Things You Can Do To Keep Your Personal Information Safe!

One Phish, Two Phish, Red Phish, Blue Phish

Posted on October 11, 2021October 10, 2021 by Jeremy

KEY POINTS A 2021 study by Proofpoint identified that 74% of US organizations fell victim to a successful phishing attack… Read more One Phish, Two Phish, Red Phish, Blue Phish

Let’s Start with the Basics!

Posted on October 4, 2021September 29, 2021 by Jeremy

KEY POINTS Research conducted by CSO Online determined that 95% of all malware attacks originate from malicious email. In 2020,… Read more Let’s Start with the Basics!

Hey! What is Your Password?

Posted on September 27, 2021September 26, 2021 by Jeremy

KEY POINTS “While STRONG passwords remain a standard for cybersecurity best practices, more companies are starting to adopt multi-factor authentication… Read more Hey! What is Your Password?

What Is Cloud Information Security?

Posted on July 19, 2021July 16, 2021 by Jeremy

KEY POINTS Gartner estimates that by 2025, 90% of organizations that fail to control public cloud use will inadvertently share… Read more What Is Cloud Information Security?

Information Security Best Practices

Posted on March 15, 2021March 14, 2021 by Jeremy

KEY POINTS 20.33% of all fraud cases reported to the FTC in 2019 involved identity scams, making identity fraud the… Read more Information Security Best Practices

Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Posted on June 22, 2020December 23, 2020 by Jeremy

KEY POINTS Cyber Criminals have mastered the art of weaponizing popular culture to launch cyber attacks. Phishing email campaigns are… Read more Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Posts navigation

Older posts

Recent Posts

  • What Are Some Common Security Vulnerabilities in Web Applications, and How Can I Prevent Them?
  • Do Routers with Built-in Firewalls Provide More Security than Those Without Them?
  • What Is a Web Application Firewall and What Are Its Benefits?
  • Data Privacy Week 2023 Starts Now! How to Take Back Control of your Data.
  • Cybersecurity at Home – 3 Simple Steps You Can Take to Secure Your Home!

Site Map

  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

Archives

Categories

Socialize With Us!

Socialize With Us!
Proudly powered by WordPress | Theme: Argent by Automattic.
We utilize third party advertisements to support our site. By using our site you agree to our privacy policy.OkNoPrivacy policy