Calm over the horizon

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you inevitably end up wearing many hats and being…


Inspired by clouds

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin so eloquently captures what I had…


Make it clean and simple

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could witness the sunrise. I could feel the sun…


When you are alone

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm. After a long time I could witness the…


Real time design tools

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could witness the sunrise. I could feel the sun…


Stumbled the concept

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin so eloquently captures what I had…


Time is passing by

Every selector has the potential to have unintended side effects by targeting unwanted elements or clashing with other selectors. More surprisingly, our…


Hey DJ play that song

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you inevitably end up wearing many hats and being…


Me Myself and I

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you inevitably end up wearing many hats and being…


My tech travel setup

One of the easiest ways to improve travel photos is shooting in better light, and the best light is often in the hour after sunrise and before sunset. That’s…


Learn the rules first

I was recently quoted as saying, I don't care if Instagram has more users than Twitter. If you read the article you’ll note there’s a big “if” before my not…


The new brand identity

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm. I’ll never forget the conversation with…


Sounds from the streets

Last year I wrote about why booking too far in advance can be dangerous for your business, and this concept of margin so eloquently captures what I had…


A day alone at the sea

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could witness the sunrise. I could feel the sun…


Some amazing buildings

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm. I’ll never forget the conversation with…


Working from your home?

Just the other day I happened to wake up early. That is unusual for an engineering student. After a long time I could witness the sunrise. I could feel the sun…


Awwwards best websites

I was recently quoted as saying, I don't care if Instagram has more users than Twitter. If you read the article you’ll note there’s a big “if” before my not…


Trust in your intuitions

When you are alone for days or weeks at a time, you eventually become drawn to people. Talking to randos is the norm. I’ll never forget the conversation with…


Top Deejay headphones

Many years ago, I worked for my parents who own a video production company. Because it is a family business, you inevitably end up wearing many hats and being…


Common Cyber Security Questions from Boards

It’s no secret that cybersecurity has become a hot topic throughout our country in regards to keeping both our homes and our businesses safe. So what are…


Quickly Improve Your Company's Security

Start 2016 off right by quickly improving the information security of your company. It is important that you stay ahead of the security and data breaches that…


Support Metrics-Driven Decisions

In the past, executive members and decision makers would meet to discuss internal findings within an organization, and key decisions would be made without much…


Validating Importance of Information Security to Decision Makers

Decision makers and executive teams of corporations have a lot of stress on their shoulders because one wrong decision can negatively impact the success of a…


Cyber Safety in Numbers

You may have heard the saying “teamwork makes the dream work.” This quote rings true when it comes to the cyber safety of your company. In most scenarios,…


Boost Confidence of Board Around Information Security

Some of the largest companies in the world are having the personal information of their customers compromised because of cyberattacks. For instance, one of…


CISO Discussing Cybersecurity

Information security has become quite a popular topic with board members over the years. The advancement of the Internet and social media has helped companies…


Goal Management: the CISO’s Dilemma

Just like any part of an organization, it is important for a Chief Information Security Officer (CISO) to lay out goals that you would like your information…


Importance of Travel Security

When you get ready to embark on a journey out of the country, what are some of the things you consider as top priority? In this day in age, most would respond…


Staying Ahead of Cyber Security Threats

When you hear the term “cyber breach,” a few companies that we will not mention may come to mind. Your company ending up on the wrong end of a cyber breach…


The Critical and Evolving Role of a CISO

Your Chief Information Security Officer (CISO) is one of the most vital positions in your organization and the importance of this role will continue to…


Importance of Real Time Information Security

Have you ever watched “The Evolution of Dance” on Youtube? In 2001 Judson Laipply, an American motivational speaker, danced to 12 different songs ranging from…


Effective Security Solutions: Be Progressive, not Submissive

With every passing year, there seems to be breaking news of a new massive online security breach that puts customer data at risk and companies in jeopardy of…


What does Your Security Software say about Your Company?

Protecting your company against the never ending cyber threats has never been more important. As a Chief Information Security Officer (CISO), the last thing…


A Manager’s Approach to Security Programs

Being the manager of information security for a company has never been more difficult. Cyber threats can come in so many different ways because of the…


Is your Company too Confident about its Security?

Growing up, we are taught that confidence is a great characteristic to have when it comes to school, sports, and friends. Some of the most successful people in…


Improve Your Cyber Security

The dreaded “Hacker Attack” on your company’s data is just one aspect of Cyber Security that must be addressed. The majority of critical data loss is…


Manage Information Security Effectively

Over the last few decades, the internet, as we used to know it, has dramatically changed. No longer does it take a website 5 minutes to load, and dial up…


Cyber Security Software

As a business hoping to survive in today’s fast paced economy, ensuring that your business, your employees and your customers are secure from cyber attacks can…


Avoid Security Breaches

Cyber Threats are very real and growing. Chief Information Security Officers (CISO) are faced with challenges from corporations and stakeholders that want to…


Improve your Cyber Security Strength

With the recent hackings of large businesses, the need for cyber security is at an all time high. Personal information that can easily be found on the internet…


Playbook for a CISO

With the advancements in technology over the last few years, cyber threats are at an all time high. Some of the largest corporations in America have been…


Controls are for Auditors, Processes are for Managers

Consider this, controls are for auditors, processes are for managers. As someone who has been issuing guidance and helping companies to improve upon their…


Effective Data Security Measures

Data Security has become one of the most important aspects of a successful business. Data Protection Strategies are not just for major corporations or those…


Evolution of Information Security

In the same way that computers and the use of the internet has exponentially increased over the last few decades, so has information security. Simply trying to…


Role of the Modern CISO

Information security breaches are becoming increasingly more common this day in age. With so many avenues for these breaches to occur, companies are at a much…


Best Practices for Cyber Data Security

If you’re a business owner you likely have a million “hats” to wear on a daily basis. You probably handle sales, marketing, customer service, IT, payroll and…


Alarming Number of Healthcare Companies Have Experienced Data Breaches

It is a startling statistic, especially when you think of how much of your personal data your health care providers has: 81% of hospitals and health insurance…


Solutions to Common Chief Information Security Officer Challenges

Being a new Chief Information Security Officer (CISO) comes with a lot of responsibility. With advancements in cyber attacks and so much going on in social…


Does your business meet the FTC's Cybersecurity Standards?

Cybersecurity...it’s all the buzz in the business world for good reason. Strong cybersecurity is a priority for businesses, their boards, and for consumers.…


Importance of Controlling User Accounts

Our data-driven economy is advancing rapidly at a rate that is difficult for Data Security to keep up. Industries are in a balancing act between giving the…


The Need for Cyber Security Education is Growing within Businesses

Cyber security is one of the hot topics in the business world with many large and reputable companies falling prey to damaging cyber attacks that compromise…


Minimize your Online Risk

We live in a day in age where almost everything is technology based. From the way our cars drive to how we lock our doors at night, our life depends a lot on…


Ashley Madison Hack

Cyber Crime is on the rise and the stakes have never been higher. Just ask the owners of hacked website Ashley Madison where Over 30 Million Accounts were…


Be Prepared for Destructive Malware

Destructive Malware utilizes common communication tools to impact daily operations of an organization. The threat may be spread through a malicious email or…


Successful Information Security

The world we live in can be a scary place. Identity theft, personal information exposed, money being stolen from credit card numbers, there are so many things…


Usable Information Security Analyzation

What is the point of valuable security data if you do not know how to analyze the results? Just like with a clothing store, there needs to be something behind…


How To: Securely Use The Cloud

At Secure Digital Solutions we’re often asked how businesses can securely use the cloud. Sure the cloud offers loads of flexibility when it comes to data…


American's Cyber Insecurities

With all of the recent cyber attacks, data security has been in the news a lot as of late. There are a wide variety of different attacks that consumers and…


Keep Your Computer Safe Online

Keeping your computer safe can be difficult. Internet safety is especially important when it comes to corporate networks. A business network is only as safe as…


Cyber Security Risk Assessment and Resolutions

High profile data breaches have heightened awareness of the need for Information Security. Every Chief Information Security Officer (CISO) must be able to…


Why Cyber Security Matters

As the information superhighway expands to virtually every area of the globe, we all must realize that today’s society lives in a globally connected world.…


Interactive Security Dashboard

Data breaches are becoming more and more common among organizations of all sizes. Preventing these breaches takes a unified approach from the everyday employee…


The Cost of a Data Breach

If you’ve been following the news lately you’ve likely heard of data breaches affecting companies of all sizes. These breaches have cost companies billions of…


Prevent a Data Breach

As technology continues to dominate our lives, the threat that some type of threat such as a data breach can significantly impact us is very real. Companies…


Hello world!