Vulnerability Assessment

Meanwhile, Back At The Office


We live in a world of robocalls and spam, a digital landscape that requires an increasingly detailed view of our particulars to gain entry. At that point, organizations not unlike your own are tasked with securing that data against the endless wave of threats washing up on every shore. We have PINs and passwords, logins [...]

Meanwhile, Back At The Office2019-05-02T13:04:30+00:00

Indirect Deposit


Making payroll. It’s the heartbeat of any organization. While we’d all like to work for free doing great things and moving the human ball forward, those mortgage payments and utility bills remind us with uncanny regularity just how important a paycheck can be. This is especially true for folks in the sleepy beach-bound burb of [...]

Indirect Deposit2019-05-29T15:02:26+00:00

Digital Carcinogens


As if cybercrime wasn’t cancer enough, researchers have now discovered that hackers can give you cancer. Not literally, of course, but in a manner that is certainly emotionally malignant. A proof-of-concept malware has been developed that manipulates the technologies typically used in support of CT scans, and […]

Digital Carcinogens2019-05-01T21:48:17+00:00

The Fine Line Between Hats


Ever wonder how razor-thin the line might be between the good guys and the bad guys? What is it that separates the two? In order to be a good white hat, you have to think like a black hat, and vice versa. […]

The Fine Line Between Hats2019-05-01T21:44:54+00:00

We Are Here To “Pump You UP!”


Bodybuilding is a movement that even warranted a long-running skit on SNL, with Dana Carvey and somebody else whose name is less familiar urging on the would-be fitness junkies in an accent that is not quite Austrian. It may have been an attempt to mimic the voice and […]

We Are Here To “Pump You UP!”2019-05-01T21:39:58+00:00

The Cybersecurity Of Low Tech


Let’s say you’re an orange grower in Florida or a large dairy operation in Wisconsin. While these endeavors still depend on Mother Nature, a decidedly low-tech enterprise, the processes involved with the harvesting, marketing, and […]

The Cybersecurity Of Low Tech2019-04-22T19:22:57+00:00

Is Cybersecurity A Game?


For years, consumer advocacy groups have been warning about the effects of video games on our culture, suggesting that the violence of the games and the depth to which the players are drawn into the imaginary scenario often makes it difficult to separate the imagined […]

Is Cybersecurity A Game?2019-04-22T19:17:23+00:00


60 Commerce Street, Ste 1100
Montgomery, AL 36104

Phone: 877-ICS-INC9 (877-427-4629)

Fax: 334-270-2892


1909 Hillbrooke Trail, Ste 1
Tallahassee, FL 32311

Phone: 850-205-7501


1930 Isaac Newton Square, Suite 205
Reston, VA 20190