Perspectives

Updates, Perspective, and Practical Guidance From Second Son Consulting

Browse by Category
Search Articles

June 3, 2021

Do you have Amazon Echo devices in your office? Or Ring lights and cameras? If so, you have 5 days to opt-OUT of a program that you should know about.

January 27, 2021

Here's the short version...Apple released two patches last night that close security issues in iOS 14 and iPadOS 14. There is at least one report that these security holes "may" have been exploited already, meaning bad actors may be taking advantage of the issue "in the wild."

September 3, 2020

As most of you convert to and leverage cloud software and tools to enable your companies in the current COVID-19 landscape, there are now new, additional considerations. Major cloud software vendors tend to support only current or recent major versions of macOS, and thus maintaining computers and their operating systems may now be more important than ever.

February 5, 2020

As we enter into a new decade, we can’t help but also reflect on the last one: our growth as a company, as a team, our lessons learned, and our incredible accomplishments along the way. One of the most memorable, and proudest, accomplishments occurred as an unexpected result of plain and simple diligence.

September 16, 2017

Technology has changed the way that we do business. This is true of nearly every industry, and it is equally true for criminals and con artists. What started as “Nigerian Prince” email scams have evolved ....

July 10, 2017

During the final week of June, a malware named Petya – or NotPetya, or Goldeneye, depending on who you ask – began its assault upon computers in 65 countries.

May 17, 2017

In the early hours of Friday, May 12, 2017, a hack now dubbed WannaCry began spreading like wildfire.

December 29, 2016

Large breaches of username and password combinations are becoming far more frequent. In the past few years we’ve seen users of LinkedIn, Dropbox, Adobe, Myspace, and now Yahoo! fall victim to hacks of username and password databases.