Posts By Michael Horsch Fizz

How to Bypass Your Best Computer Security System in Ten Minutes

In the time it takes you to read this short article, an intruder can create 3-5 user accounts within your business system. Social engineering is a technique hackers use to take over an account by persuading or psychologically manipulating people to divulge confidential information. This is usually the first step within a more complex scheme.Read… Read more »

Mobile App Threats to Your Organization at the Code

In today’s computing environment, we have moved beyond the desktop and wired environment and into the mobile world. Our mobile devices are true computing platforms with their own operating systems and resources; yet we don’t often think about the computer we are carrying in our pocket. How safe are the applications we use? How secureRead… Read more »