Calm over the horizon

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you…


Inspired by clouds

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin…


Make it clean and simple

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could…


When you are alone

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm.…


Real time design tools

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could…


Stumbled the concept

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin…


Time is passing by

Every selector has the potential to have unintended side effects by targeting unwanted elements or clashing with other…


Hey DJ play that song

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you…


Me Myself and I

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you…


My tech travel setup

One of the easiest ways to improve travel photos is shooting in better light, and the best light is often in the hour…


Learn the rules first

I was recently quoted as saying, I don't care if Instagram has more users than Twitter. If you read the article you’ll…


The new brand identity

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm.…


Sounds from the streets

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin…


A day alone at the sea

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could…


Some amazing buildings

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm.…


Working from your home?

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could…


Awwwards best websites

I was recently quoted as saying, I don't care if Instagram has more users than Twitter. If you read the article you’ll…


Trust in your intuitions

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm.…


Common Cyber Security Questions from Boards

It’s no secret that cybersecurity has become a hot topic throughout our country in regards to keeping both our homes…


Quickly Improve Your Company's Security

Start 2016 off right by quickly improving the information security of your company. It is important that you stay ahead…


Support Metrics-Driven Decisions

In the past, executive members and decision makers would meet to discuss internal findings within an organization, and…


Validating Importance of Information Security to Decision Makers

Decision makers and executive teams of corporations have a lot of stress on their shoulders because one wrong decision…


Cyber Safety in Numbers

You may have heard the saying “teamwork makes the dream work.” This quote rings true when it comes to the cyber safety…


Boost Confidence of Board Around Information Security

Some of the largest companies in the world are having the personal information of their customers compromised because…


CISO Discussing Cybersecurity

Information security has become quite a popular topic with board members over the years. The advancement of the…


Goal Management: the CISO’s Dilemma

Just like any part of an organization, it is important for a Chief Information Security Officer (CISO) to lay out goals…


Importance of Travel Security

When you get ready to embark on a journey out of the country, what are some of the things you consider as top priority?…


Staying Ahead of Cyber Security Threats

When you hear the term “cyber breach,” a few companies that we will not mention may come to mind. Your company ending…


The Critical and Evolving Role of a CISO

Your Chief Information Security Officer (CISO) is one of the most vital positions in your organization and the…


Importance of Real Time Information Security

Have you ever watched “The Evolution of Dance” on Youtube? In 2001 Judson Laipply, an American motivational speaker,…


Effective Security Solutions: Be Progressive, not Submissive

With every passing year, there seems to be breaking news of a new massive online security breach that puts customer…


What does Your Security Software say about Your Company?

Protecting your company against the never ending cyber threats has never been more important. As a Chief Information…


A Manager’s Approach to Security Programs

Being the manager of information security for a company has never been more difficult. Cyber threats can come in so…


Is your Company too Confident about its Security?

Growing up, we are taught that confidence is a great characteristic to have when it comes to school, sports, and…


Improve Your Cyber Security

The dreaded “Hacker Attack” on your company’s data is just one aspect of Cyber Security that must be addressed. The…


Manage Information Security Effectively

Over the last few decades, the internet, as we used to know it, has dramatically changed. No longer does it take a…


Cyber Security Software

As a business hoping to survive in today’s fast paced economy, ensuring that your business, your employees and your…


Avoid Security Breaches

Cyber Threats are very real and growing. Chief Information Security Officers (CISO) are faced with challenges from…


Improve your Cyber Security Strength

With the recent hackings of large businesses, the need for cyber security is at an all time high. Personal information…


Playbook for a CISO

With the advancements in technology over the last few years, cyber threats are at an all time high. Some of the largest…


Controls are for Auditors, Processes are for Managers

Consider this, controls are for auditors, processes are for managers. As someone who has been issuing guidance and…


Effective Data Security Measures

Data Security has become one of the most important aspects of a successful business. Data Protection Strategies are not…


Evolution of Information Security

In the same way that computers and the use of the internet has exponentially increased over the last few decades, so…


Role of the Modern CISO

Information security breaches are becoming increasingly more common this day in age. With so many avenues for these…


Best Practices for Cyber Data Security

If you’re a business owner you likely have a million “hats” to wear on a daily basis. You probably handle sales,…


Alarming Number of Healthcare Companies Have Experienced Data Breaches

It is a startling statistic, especially when you think of how much of your personal data your health care providers…


Solutions to Common Chief Information Security Officer Challenges

Being a new Chief Information Security Officer (CISO) comes with a lot of responsibility. With advancements in cyber…


Does your business meet the FTC's Cybersecurity Standards?

Cybersecurity...it’s all the buzz in the business world for good reason. Strong cybersecurity is a priority for…


Importance of Controlling User Accounts

Our data-driven economy is advancing rapidly at a rate that is difficult for Data Security to keep up. Industries are…


The Need for Cyber Security Education is Growing within Businesses

Cyber security is one of the hot topics in the business world with many large and reputable companies falling prey to…


Minimize your Online Risk

We live in a day in age where almost everything is technology based. From the way our cars drive to how we lock our…


Ashley Madison Hack

Cyber Crime is on the rise and the stakes have never been higher. Just ask the owners of hacked website Ashley Madison…


Be Prepared for Destructive Malware

Destructive Malware utilizes common communication tools to impact daily operations of an organization. The threat may…


Successful Information Security

The world we live in can be a scary place. Identity theft, personal information exposed, money being stolen from credit…


Usable Information Security Analyzation

What is the point of valuable security data if you do not know how to analyze the results? Just like with a clothing…


How To: Securely Use The Cloud

At Secure Digital Solutions we’re often asked how businesses can securely use the cloud. Sure the cloud offers loads of…


American's Cyber Insecurities

With all of the recent cyber attacks, data security has been in the news a lot as of late. There are a wide variety of…


Keep Your Computer Safe Online

Keeping your computer safe can be difficult. Internet safety is especially important when it comes to corporate…


Cyber Security Risk Assessment and Resolutions

High profile data breaches have heightened awareness of the need for Information Security. Every Chief Information…


Why Cyber Security Matters

As the information superhighway expands to virtually every area of the globe, we all must realize that today’s society…


Interactive Security Dashboard

Data breaches are becoming more and more common among organizations of all sizes. Preventing these breaches takes a…


The Cost of a Data Breach

If you’ve been following the news lately you’ve likely heard of data breaches affecting companies of all sizes. These…


Prevent a Data Breach

As technology continues to dominate our lives, the threat that some type of threat such as a data breach can…