Skip to content
  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

O'Mard Consulting Services, LLC

Plan, Execute, Win, Repeat!

Tag: #tech

Is TikTok Really That Bad? An Analysis of the Privacy Concerns Associated with the App.

Posted on July 20, 2020July 19, 2020 by Jeremy

KEY POINTS Originally launched by ByteDance, for markets outside of China in 2017, TikTok is one of the most popular… Read more Is TikTok Really That Bad? An Analysis of the Privacy Concerns Associated with the App.

What Should You Do With an Old or Broken Computer That Still has Personal Information On it?

Posted on July 13, 2020July 12, 2020 by Jeremy

This Ask the Experts session stems from a question originally posted on Quora regarding data security best practices. Our computers… Read more What Should You Do With an Old or Broken Computer That Still has Personal Information On it?

Business Email Compromise – What you Need to Know to Secure your Organization!

Posted on July 6, 2020April 2, 2021 by Jeremy

KEY POINTS In their 2019 Internet Crime Report, the FBI stated that Business Email Compromise accounted for $1.77 billion in… Read more Business Email Compromise – What you Need to Know to Secure your Organization!

Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Posted on June 22, 2020December 23, 2020 by Jeremy

KEY POINTS Cyber Criminals have mastered the art of weaponizing popular culture to launch cyber attacks. Phishing email campaigns are… Read more Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Hackers Targeting Mobile Banking Apps – What You Need to Know!

Posted on June 15, 2020January 6, 2021 by Jeremy

KEY POINTS According to the FBI, the use of mobile banking apps has increased by 50% since the beginning of… Read more Hackers Targeting Mobile Banking Apps – What You Need to Know!

A Quick Guide on Mobile Device Security Best Practices!

Posted on June 8, 2020June 7, 2020 by Jeremy

KEY POINTS According to Wandera, corporate mobile devices use Wi-Fi roughly three times as much as they use cellular data.… Read more A Quick Guide on Mobile Device Security Best Practices!

“Want to Turn $100 into $800?” – The Anatomy of the Circle Game

Posted on June 1, 2020June 2, 2020 by Jeremy

KEY POINTS Pyramid schemes work by moving money from those on the bottom of an organization to the top. The… Read more “Want to Turn $100 into $800?” – The Anatomy of the Circle Game

What does Incognito/Private Browsing Mode Really Do?

Posted on May 26, 2020May 26, 2020 by Jeremy

KEY POINTS Many people are under the false impression that private browsing makes you invisible online. Your employer and or… Read more What does Incognito/Private Browsing Mode Really Do?

Posts navigation

Newer posts

Recent Posts

  • Take Control of Your Online Data: 4 Practical Tips You Can Use This Data Privacy Week!
  • Fear, Uncertainty, and Doubt – Combating Disinformation and Misinformation in the midst of an Election Year (2024)
  • Harnessing the Power of AI for Incident Response in Cybersecurity
  • Stay Safe and Secure: Your Guide to Online Job Hunting!
  • Tax Time and Tech Crime: 3 Ways to Stay Safe Online This Season!

Site Map

  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

Archives

Categories

Socialize With Us!

Proudly powered by WordPress | Theme: Argent by Automattic.
We utilize third party advertisements to support our site. By using our site you agree to our privacy policy.OkNoPrivacy policy