Skip to content
  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

O'Mard Consulting Services, LLC

Plan, Execute, Win, Repeat!

Category: Cyber Security

Let’s Start with the Basics!

Posted on October 4, 2021September 29, 2021 by Jeremy

KEY POINTS Research conducted by CSO Online determined that 95% of all malware attacks originate from malicious email. In 2020,… Read more Let’s Start with the Basics!

Hey! What is Your Password?

Posted on September 27, 2021September 26, 2021 by Jeremy

KEY POINTS “While STRONG passwords remain a standard for cybersecurity best practices, more companies are starting to adopt multi-factor authentication… Read more Hey! What is Your Password?

What Is Cloud Information Security?

Posted on July 19, 2021July 16, 2021 by Jeremy

KEY POINTS Gartner estimates that by 2025, 90% of organizations that fail to control public cloud use will inadvertently share… Read more What Is Cloud Information Security?

Information Security Best Practices

Posted on March 15, 2021March 14, 2021 by Jeremy

KEY POINTS 20.33% of all fraud cases reported to the FTC in 2019 involved identity scams, making identity fraud the… Read more Information Security Best Practices

Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Posted on June 22, 2020December 23, 2020 by Jeremy

KEY POINTS Cyber Criminals have mastered the art of weaponizing popular culture to launch cyber attacks. Phishing email campaigns are… Read more Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

A Quick Guide on Mobile Device Security Best Practices!

Posted on June 8, 2020June 7, 2020 by Jeremy

KEY POINTS According to Wandera, corporate mobile devices use Wi-Fi roughly three times as much as they use cellular data.… Read more A Quick Guide on Mobile Device Security Best Practices!

Apple’s Stock Mail App Vulnerable to Attack – Here’s What you need to know.

Posted on May 18, 2020May 17, 2020 by Jeremy

KEY POINTS Security researchers have recently identified two Apple iOS vulnerabilities that allow attackers access to data on your iPhone… Read more Apple’s Stock Mail App Vulnerable to Attack – Here’s What you need to know.

How To Avoid Being Zoom Bombed In 5 Easy Steps!

Posted on April 6, 2020April 5, 2020 by Jeremy

KEY POINTS The Zoom maximum number of daily meeting participants increased from 10 million in December 2019 to 200 million… Read more How To Avoid Being Zoom Bombed In 5 Easy Steps!

Staying Safe While Teleworking – A list Of Best Practices To Implement During A Pandemic

Posted on March 23, 2020March 24, 2020 by Jeremy

With the majority of the corporate world moving from working in the office to working remotely, cyber criminals are prepping… Read more Staying Safe While Teleworking – A list Of Best Practices To Implement During A Pandemic

How Can I Protect My Blog From Hackers And Malicious Links?

Posted on November 5, 2019November 4, 2019 by Jeremy

We live in a world where bots and attackers are constantly scanning the internet to identify and compromise websites that… Read more How Can I Protect My Blog From Hackers And Malicious Links?

Posts navigation

Older posts
Newer posts

Recent Posts

  • Take Control of Your Online Data: 4 Practical Tips You Can Use This Data Privacy Week!
  • Fear, Uncertainty, and Doubt – Combating Disinformation and Misinformation in the midst of an Election Year (2024)
  • Harnessing the Power of AI for Incident Response in Cybersecurity
  • Stay Safe and Secure: Your Guide to Online Job Hunting!
  • Tax Time and Tech Crime: 3 Ways to Stay Safe Online This Season!

Site Map

  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

Archives

Categories

Socialize With Us!

Socialize With Us!
Proudly powered by WordPress | Theme: Argent by Automattic.
We utilize third party advertisements to support our site. By using our site you agree to our privacy policy.