Skip to content
  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

O'Mard Consulting Services, LLC

Plan, Execute, Win, Repeat!

Tag: #infosec

Your Cyber Threat Report for July 9th 2019!

Posted on July 9, 2019July 2, 2019 by Jeremy

The following info graphic provides an overview of some recent trends occurring in the cyber world. Have any questions regarding… Read more Your Cyber Threat Report for July 9th 2019!

How many characters is the most secure password?

Posted on July 2, 2019June 26, 2019 by Jeremy

The National Institute of Standards and Technology recommends that passwords be between a minimum of 8 characters and maximum of… Read more How many characters is the most secure password?

Facebook Account Security Tips for Small Business!

Posted on June 18, 2019June 17, 2019 by Jeremy

Today’s set of tips comes from our friends at the National Cyber Security Alliance. While the video is intended for… Read more Facebook Account Security Tips for Small Business!

Is there a way to keep my Gmail information away from hackers?

Posted on June 11, 2019April 15, 2021 by Jeremy

In today’s day and age, a compromised email account can have a debilitating effect on an individual. We use email… Read more Is there a way to keep my Gmail information away from hackers?

Social Engineering Tactics To Protect Your data and privacy from Social Attacks

Posted on June 4, 2019June 4, 2019 by Jeremy

Here’s an easy to digest info graphic which provides some great tips for protecting your data and privacy from malicious… Read more Social Engineering Tactics To Protect Your data and privacy from Social Attacks

Cyber Security While Traveling!

Posted on May 21, 2019May 15, 2019 by Jeremy

The U.S Department of Homeland Security has provided some useful tips regarding how to stay safe online while you’re traveling!… Read more Cyber Security While Traveling!

What can companies do to counter hackers?

Posted on May 14, 2019May 13, 2019 by Jeremy

There are multiple approaches that a company can take to detect and or protect itself from a malicious actor. They… Read more What can companies do to counter hackers?

Why is Bluetooth not a secure protocol?

Posted on April 30, 2019April 23, 2019 by Jeremy

The Bluetooth protocol has come a long way since first being invented in the late 1980s with mass adoption taking… Read more Why is Bluetooth not a secure protocol?

Machine learning: A key weapon in the cybersecurity battle

Posted on April 23, 2019April 21, 2019 by Jeremy

As hackers weaponize AI, cybersecurity professionals must fight fire with fire by using cognitive technology to identify & prevent attacks.… Read more Machine learning: A key weapon in the cybersecurity battle

Ask the Experts – A Question and Answer Session for the People by the People!

Posted on April 16, 2019April 14, 2019 by Jeremy

Part of what got me into consulting was the fact that you have the ability to help others solve their… Read more Ask the Experts – A Question and Answer Session for the People by the People!

Posts navigation

Older posts
Newer posts

Recent Posts

  • Take Control of Your Online Data: 4 Practical Tips You Can Use This Data Privacy Week!
  • Fear, Uncertainty, and Doubt – Combating Disinformation and Misinformation in the midst of an Election Year (2024)
  • Harnessing the Power of AI for Incident Response in Cybersecurity
  • Stay Safe and Secure: Your Guide to Online Job Hunting!
  • Tax Time and Tech Crime: 3 Ways to Stay Safe Online This Season!

Site Map

  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

Archives

Categories

Socialize With Us!

Socialize With Us!
Proudly powered by WordPress | Theme: Argent by Automattic.
 

Loading Comments...
 

    We utilize third party advertisements to support our site. By using our site you agree to our privacy policy.OkNoPrivacy policy