Calm over the horizon

Many years ago, I worked for my parents who own a video production company.…

Inspired by clouds

Last year I wrote about why booking too far in advance can be dangerous for…

Make it clean and simple

Just the other day I happened to wake up early. That is unusual for an…

When you are alone

When you are alone for days or weeks at a time, you eventually become drawn to…

Real time design tools

Just the other day I happened to wake up early. That is unusual for an…

Stumbled the concept

Last year I wrote about why booking too far in advance can be dangerous for…

Time is passing by

Every selector has the potential to have unintended side effects by targeting…

Hey DJ play that song

Many years ago, I worked for my parents who own a video production company.…

Me Myself and I

Many years ago, I worked for my parents who own a video production company.…

My tech travel setup

One of the easiest ways to improve travel photos is shooting in better light,…

Learn the rules first

I was recently quoted as saying, I don't care if Instagram has more users than…

The new brand identity

When you are alone for days or weeks at a time, you eventually become drawn to…

Sounds from the streets

Last year I wrote about why booking too far in advance can be dangerous for…

A day alone at the sea

Just the other day I happened to wake up early. That is unusual for an…

Some amazing buildings

When you are alone for days or weeks at a time, you eventually become drawn to…

Working from your home?

Just the other day I happened to wake up early. That is unusual for an…

Awwwards best websites

I was recently quoted as saying, I don't care if Instagram has more users than…

Trust in your intuitions

When you are alone for days or weeks at a time, you eventually become drawn to…

Top Deejay headphones

Many years ago, I worked for my parents who own a video production company.…

Common Cyber Security Questions from Boards

It’s no secret that cybersecurity has become a hot topic throughout our country…

Quickly Improve Your Company's Security

Start 2016 off right by quickly improving the information security of your…

Support Metrics-Driven Decisions

In the past, executive members and decision makers would meet to discuss…

Validating Importance of Information Security to Decision Makers

Decision makers and executive teams of corporations have a lot of stress on…

Cyber Safety in Numbers

You may have heard the saying “teamwork makes the dream work.” This quote rings…

Boost Confidence of Board Around Information Security

Some of the largest companies in the world are having the personal information…

CISO Discussing Cybersecurity

Information security has become quite a popular topic with board members over…

Goal Management: the CISO’s Dilemma

Just like any part of an organization, it is important for a Chief Information…

Importance of Travel Security

When you get ready to embark on a journey out of the country, what are some of…

Staying Ahead of Cyber Security Threats

When you hear the term “cyber breach,” a few companies that we will not mention…

The Critical and Evolving Role of a CISO

Your Chief Information Security Officer (CISO) is one of the most vital…

Importance of Real Time Information Security

Have you ever watched “The Evolution of Dance” on Youtube? In 2001 Judson…

Effective Security Solutions: Be Progressive, not Submissive

With every passing year, there seems to be breaking news of a new massive…

What does Your Security Software say about Your Company?

Protecting your company against the never ending cyber threats has never been…

A Manager’s Approach to Security Programs

Being the manager of information security for a company has never been more…

Is your Company too Confident about its Security?

Growing up, we are taught that confidence is a great characteristic to have…

Improve Your Cyber Security

The dreaded “Hacker Attack” on your company’s data is just one aspect of Cyber…

Manage Information Security Effectively

Over the last few decades, the internet, as we used to know it, has…

Cyber Security Software

As a business hoping to survive in today’s fast paced economy, ensuring that…

Avoid Security Breaches

Cyber Threats are very real and growing. Chief Information Security Officers…

Improve your Cyber Security Strength

With the recent hackings of large businesses, the need for cyber security is at…

Playbook for a CISO

With the advancements in technology over the last few years, cyber threats are…

Controls are for Auditors, Processes are for Managers

Consider this, controls are for auditors, processes are for managers. As…

Effective Data Security Measures

Data Security has become one of the most important aspects of a successful…

Evolution of Information Security

In the same way that computers and the use of the internet has exponentially…

Role of the Modern CISO

Information security breaches are becoming increasingly more common this day in…

Best Practices for Cyber Data Security

If you’re a business owner you likely have a million “hats” to wear on a daily…

Solutions to Common Chief Information Security Officer Challenges

Being a new Chief Information Security Officer (CISO) comes with a lot of…

Does your business meet the FTC's Cybersecurity Standards?

Cybersecurity...it’s all the buzz in the business world for good reason. Strong…

Importance of Controlling User Accounts

Our data-driven economy is advancing rapidly at a rate that is difficult for…

The Need for Cyber Security Education is Growing within Businesses

Cyber security is one of the hot topics in the business world with many large…

Minimize your Online Risk

We live in a day in age where almost everything is technology based. From the…

Ashley Madison Hack

Cyber Crime is on the rise and the stakes have never been higher. Just ask the…

Be Prepared for Destructive Malware

Destructive Malware utilizes common communication tools to impact daily…

Successful Information Security

The world we live in can be a scary place. Identity theft, personal information…

Usable Information Security Analyzation

What is the point of valuable security data if you do not know how to analyze…

How To: Securely Use The Cloud

At Secure Digital Solutions we’re often asked how businesses can securely use…

American's Cyber Insecurities

With all of the recent cyber attacks, data security has been in the news a lot…

Keep Your Computer Safe Online

Keeping your computer safe can be difficult. Internet safety is especially…

Cyber Security Risk Assessment and Resolutions

High profile data breaches have heightened awareness of the need for…

Why Cyber Security Matters

As the information superhighway expands to virtually every area of the globe,…

Interactive Security Dashboard

Data breaches are becoming more and more common among organizations of all…

The Cost of a Data Breach

If you’ve been following the news lately you’ve likely heard of data breaches…

Prevent a Data Breach

As technology continues to dominate our lives, the threat that some type of…