<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Cadre Blog

Never miss the latest in IT Security! Subscribe Now.

Little-known Facts About Remote Worker Security that Could Damage Your Business

With the ongoing rush to transition staff to remote workers, great opportunities open for con artists and evil hackers to exploit the situation. We in IT and even IS often think that software controls such as VPNs, DLP and Cloud technologies will...

Read More

Five Tips to Ensure Your Company's Bluetooth Security Policies are Up to Date

Urban Legend Becomes Real

Several years ago some reports came to information security experts from black hat chat sites (evil hacker online groups). The reports said that thieves were stealing high-profile mobile devices left in cars using...

Read More

6 Questions to Help You Hire & Evaluate Security Solution Providers

Cybercrime cost the global economy as much as $600 billion in 2017,(1) so unless your business and all of your customers and employees have no interaction with the internet or modern networking technology, chances are you have hired or will hire...

Read More

An Insider's Guide to the FBI Cyber Security Briefing on Iran

Cadre’s manager of Knowledge Services, Tim O’Connor, was invited to an FBI Cyber Security briefing on the official Threat Profile for Iran. He gave us a download on everything he learned about what to look for and how to protect your company. 

...

Read More

How to Prevent 4 Network Security Threats that Cost Financial Services Millions

The Capital One breach exposed over 100 million customers’ sensitive information.In 2017, 147.9 million consumers were affected by the Equifax Breach.Over the past few years, data breaches have affected over 1 trillion user accounts and the...

Read More

Myth Busted: Small Organizations are at Low Risk of Hacking Because they are not Desirable Targets For Hackers

All of these are common myths, but only one has dangerous misinformation. Can you figure it out?

  1. George Washington chopped down a cherry tree. 
  2. After you die, your fingernails continue to grow. 
  3. You don’t have to worry about your small business...
Read More

A Former CTO of the FBI Cyber Division on the State of Cybersecurity

Part 3 of a three-part series

Milan Patel, current chief client officer at BlueVoyant and former CTO of the FBI Cyber Division, keeps up with the latest in cybercrime and cybersecurity.  (If you missed his great tale of his first FBI vehicle—not...

Read More

The Advice a Former CTO of the FBI Cyber Division Would Give His Best Friend About Cybersecurity

Milan Patel has seen a thing or two. He can’t talk about some of it, which makes sense, given that he’s the former CTO of the FBI Cyber Division. While there, he organized and co-led the Joint Requirements Team, facilitated by the White House...

Read More

What a Former CTO of the FBI Cyber Division Thinks Should Keep You Up At Night

Part 1 of a three-part series

Even if you weren’t interested in cybersecurity, Milan Patel is the kind of guy you hope you get seated next to at a dinner party so you can listen to his stories. Currently the Chief Client Officer at BlueVoyant,...

Read More

How to Improve Your IT Security for the Upcoming Elections

Small governments seem to be stuck between a rock and several hard places.

Read More

If Your Healthcare Data is Leaked Chances are Your Doctor’s Office, not an Evil Hacker, is to Blame

New research from Michigan State and Johns Hopkins Universities show that failed internal information handling and negligence at healthcare providers’ offices accounts for more than half of personal health information (PHI) breaches.

Read More

Research Suggests Your Battery Might be the Key to Thwarting the World’s Most Elusive Malware

Micro-architectural attacks are arguably the most dangerous and difficult of all forms of systems compromise to detect. Micro-architectural attacks leverage flaws in the chip hardware design of computer components. These kinds of flaws are...

Read More

Grab-n-Go Baldr Malware: A Stunning New Type of Malware

A revolutionary new type of malware toolset is starting to show up in dark web hacking forums. The new malware architecture is being called “Grab-n-Go”.

Until now, malware was designed to infect a computer, network or mobile device and stay...

Read More