Consulting with a Conscience™

A cruciallogics blog

23 Jun 2022

Cloudy with a Chance of Data Leakage Part II – Protection and Prevention

Data leakages can happen unintentionally, or they can be caused by mal...

27 May 2022

Cloudy with a Chance of Data Leakage Part I - Threats and Impacts

More than 60% of corporate data worldwide is stored in the cloud, and ...

21 Feb 2022

The Top 7 Threats in Mobile Device Security

There are more than 4.3 billion active mobile internet users worldwide...

09 Feb 2022

The Importance of Penetration Testing and 6 Reasons Why It Should Be Outsourced

Cybercrime cost the global economy $6 trillion in 2021, up from $3 tri...

07 Jan 2022

4 Future Trends in the Digital World

As IT teams continue to deal with the chaos caused by COVID-19, they a...

08 Dec 2021

Managing Those End Users: Lessons Learned from HyperCare Consultants

While we often talk about the risk associated with hackers and other c...

06 Dec 2021

Hack Me If You Can

Cybercrime is now considered to be the most serious economic and secur...

12 Nov 2021

Identify and Stop Threats with Azure Sentinel and the Power of AI

 

19 Jul 2021
Security Cybercrime | 6 min read

4 Most Common Hacks Today and How to Mitigate Against Them

Cybercrime is on the rise around the world, and hackers are getting bo...

01 Jun 2021
Security Microsoft | 3 min read

Augment Your Pentest with a Comprehensive Office 365 Assessment

While the Covid-19 crisis is “moving the world toward increased techno...