The Verkada Hack Was Not A Hack

"With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to hackers, who had used high-level log-in credentials to access and plunder Verkada's vast camera network." - Washington Post . Last week's Verkada "hack" was not a hack. They...

Read More

Water Plant Cyberattack

In a recent article for HelpNetSecurity, TetherView's CEO Michael Abboud discusses the recent Cyberattack on a water plant in Oldsmar Florida, as well as the cybersecurity challenges faced by local municipalities throughout the US.   Read the full article here Follow Helpnetsecurity on Twitter ...

Read More
Mitigating Key Person Risk

Key Person Risk

Key Person Dependency Risk is the threat posed to an organization by a team’s over-reliance on one or a few individuals. Generally, this Key Person or Key People have sole custody over critical institutional knowledge, creativity, reputation or experience that makes them indispensable to the organization’s...

Read More
Enabling Mobile Device Management

Mobile Device Management

As the COVID-19 outbreak continues to impact industries throughout the world, invest advisory and accounting firms have enabled employees to work remotely. While working from home may be nothing new to some, the realities of COVID have forced organizations to shift to a full-on work...

Read More

Why WFH is Here to Stay

For the past 15 years, organizations have made a slow move towards enabling employees to work from home. One of the first enablement’s, was the 24/7 accessibility of laptops and cell phones. Workers were able to handle mission critical emails and calls—even on weekends. However,...

Read More
Comparing public and private cloud offerings

Public vs. Private Cloud: What You Need to Know

When it comes to streamlining operations and controlling costs, most companies are aware that cloud environments provide significant benefits over on-premises solutions. You can afford a more robust infrastructure, support mobility, and even increase security, all while lowering the expense associated with managing your IT...

Read More