Recent Posts

Categories

See all

Archives

See all

TNP Blog

Password Reuse Problems Persist Despite Known Risks

Everyone is aware of the fact that digital security is becoming a bigger concern and a more expensive mistake with every passing day. Whether you are an individual or a business, cybercriminals are out to get whatever they can get and they don't

Read more

NIST Brings Threat Modeling into the Spotlight

Threat modeling hasn't always gotten the recognition that it deserves but the recent Recommended Minimum Standard for Vendor or Developer Verification of Code by the National Institute of Standards and Technology (NIST) is taking a big step in this

Read more

Reduce Privacy Risks

We all understand how important data is these days. More important than getting good quality data to base decisions off on it's important to be able to protect data and safeguard the organization as a whole. Today, companies have access to tons of

Read more

CMMC, CUI, And Cloud Vendors – Do You Need FedRAMP?

If you are looking to work with the DoD then you probably already know that you need CMMC qualifications. The key role of CMMC is to create a more secure environment for the business and the overall supply chain to better protect against any and all

Read more

How to Prevent Account Takeovers in 2021

Today more of our world is digital than ever before. Everything from reading the newspaper, to checking what your friends are up to, to ordering food or even ordering some new clothes requires some kind of account. Moreover, most of these accounts

Read more

Artificial Intelligence

If you asked someone about Artificial Intelligence just a few decades ago, they would have no clue about what you were saying. In the late 1990s and the early 2000s, Hollywood helped bring this technological marvel to the forefront with many fiction

Read more

Why Endpoint Security Is Important

Anyone who is even vaguely familiar with digital security and safe digital practices will tell you that building a secure digital environment is not an easy task. Even for businesses that use relatively small and simple systems, creating the right

Read more

6 Factors for CMMC Compliance

The Department of Defense (DoD) has certainly taken a big step forward to safeguard both the data itself and the companies that interact with this data in the form of the CMMC framework. This is a unique data protocol in the sense that it requires a

Read more

The Rise of Ransomware: Ransomware Prevention Tips

Ransomware is a type of malware used by cybercriminals that lock your hard drive or encrypt your data for ransom. Ransomware viruses can infect your computer in the form of email attachments that you incautiously download. After download, the virus

Read more

Top 5 iPhone Security Tips

While iPhone devices are not exposed to the same variety of security threats as Android smartphones, they are still way too far from being bulletproof. Therefore, you cannot neglect security measures just because you own an iPhone since Apple

Read more

Recent Posts

Categories

See all

Archives

See all