Calm over the horizon

Many years ago, I worked for my parents who own a video…


Inspired by clouds

Last year I wrote about why booking too far in advance can…


Make it clean and simple

Just the other day I happened to wake up early. That is…


When you are alone

When you are alone for days or weeks at a time, you…


Real time design tools

Just the other day I happened to wake up early. That is…


Stumbled the concept

Last year I wrote about why booking too far in advance can…


Time is passing by

Every selector has the potential to have unintended side…


Hey DJ play that song

Many years ago, I worked for my parents who own a video…


Me Myself and I

Many years ago, I worked for my parents who own a video…


My tech travel setup

One of the easiest ways to improve travel photos is…


Learn the rules first

I was recently quoted as saying, I don't care if Instagram…


The new brand identity

When you are alone for days or weeks at a time, you…


Sounds from the streets

Last year I wrote about why booking too far in advance can…


A day alone at the sea

Just the other day I happened to wake up early. That is…


Some amazing buildings

When you are alone for days or weeks at a time, you…


Working from your home?

Just the other day I happened to wake up early. That is…


Awwwards best websites

I was recently quoted as saying, I don't care if Instagram…


Trust in your intuitions

When you are alone for days or weeks at a time, you…


Top Deejay headphones

Many years ago, I worked for my parents who own a video…


Support Metrics-Driven Decisions

In the past, executive members and decision makers would…


Cyber Safety in Numbers

You may have heard the saying “teamwork makes the dream…


Boost Confidence of Board Around Information Security

Some of the largest companies in the world are having the…


CISO Discussing Cybersecurity

Information security has become quite a popular topic with…


Goal Management: the CISO’s Dilemma

Just like any part of an organization, it is important for…


Importance of Travel Security

When you get ready to embark on a journey out of the…


Staying Ahead of Cyber Security Threats

When you hear the term “cyber breach,” a few companies that…


The Critical and Evolving Role of a CISO

Your Chief Information Security Officer (CISO) is one of…


Importance of Real Time Information Security

Have you ever watched “The Evolution of Dance” on Youtube?…


Effective Security Solutions: Be Progressive, not Submissive

With every passing year, there seems to be breaking news of…


What does Your Security Software say about Your Company?

Protecting your company against the never ending cyber…


A Manager’s Approach to Security Programs

Being the manager of information security for a company has…


Improve Your Cyber Security

The dreaded “Hacker Attack” on your company’s data is just…


Manage Information Security Effectively

Over the last few decades, the internet, as we used to know…


Cyber Security Software

As a business hoping to survive in today’s fast paced…


Avoid Security Breaches

Cyber Threats are very real and growing. Chief Information…


Improve your Cyber Security Strength

With the recent hackings of large businesses, the need for…


Playbook for a CISO

With the advancements in technology over the last few…


Controls are for Auditors, Processes are for Managers

Consider this, controls are for auditors, processes are for…


Effective Data Security Measures

Data Security has become one of the most important aspects…


Evolution of Information Security

In the same way that computers and the use of the internet…


Role of the Modern CISO

Information security breaches are becoming increasingly…


Best Practices for Cyber Data Security

If you’re a business owner you likely have a million “hats”…


Does your business meet the FTC's Cybersecurity Standards?

Cybersecurity...it’s all the buzz in the business world for…


Importance of Controlling User Accounts

Our data-driven economy is advancing rapidly at a rate that…


The Need for Cyber Security Education is Growing within Businesses

Cyber security is one of the hot topics in the business…


Minimize your Online Risk

We live in a day in age where almost everything is…


Ashley Madison Hack

Cyber Crime is on the rise and the stakes have never been…


Be Prepared for Destructive Malware

Destructive Malware utilizes common communication tools to…


Successful Information Security

The world we live in can be a scary place. Identity theft,…


Usable Information Security Analyzation

What is the point of valuable security data if you do not…


How To: Securely Use The Cloud

At Secure Digital Solutions we’re often asked how…


American's Cyber Insecurities

With all of the recent cyber attacks, data security has…


Keep Your Computer Safe Online

Keeping your computer safe can be difficult. Internet…


Cyber Security Risk Assessment and Resolutions

High profile data breaches have heightened awareness of the…


Why Cyber Security Matters

As the information superhighway expands to virtually every…


Interactive Security Dashboard

Data breaches are becoming more and more common among…


The Cost of a Data Breach

If you’ve been following the news lately you’ve likely…


Prevent a Data Breach

As technology continues to dominate our lives, the threat…