BLOG

handshake
 Intelligence Services Group (ISG) and HUMAN Security Join Forces to Combat Rising Threats from Malicious BOTS  Download the attachment to learn more: CLICK HERE
Businessman hand holding money banknote for paying the key from hacker for unlock folder got ransomware malware virus computer. Vector illustration technology data privacy and security concept.
Crossroads of Ransomware: To Pay or Not to Pay Last evening I had the pleasure of attending a meeting with Dr. Mansur Hasib and others taking a light hearted perspective at ransomware. The conversation was fun and had a “hint” of sarcasm on how some believe these criminals have any
leadership image
Leadership Change Required There is a renaissance on the topic of business leadership and what it means to be a leader in today’s world. Is it because of a leadership void across our culture? Maybe we’re experiencing a revolution requiring leadership to be more than a standard-bearer of the traditional
inspirational climb
Finding your “something”​ Now   How we respond during this nightmare will define us into the future. These responses are predicated on our deep convictions, personality, experiences and beliefs that make up the core of who we are. We all look for “that something “ which sustains us, has worked
SMBs get help ISACs
SMBs – Where to Start With Security Every day another stat laden article on how SMBs are not prepared to combat security threats. We’ve all seen these articles in our LinkedIn feed, vendor marketing, media reports and direct contacts with sales personnel promising security nirvana with their technology. I get
Achilles Heel in Security
Are People the Achilles Heel in Security? Maybe When it Comes To DNA Testing Read a great article this weekend titled: A Researcher Needed Three Hours to Identify Me From My DNA I have two perspectives after reading this article. My first thought comes from my background and experience in the
password
Your Biggest Security Threat is the Least Complex to Address Poor Password Hygiene is a Major Security Threat Every day we guide clients in their pursuit of data security. Depending on the use case this guidance focuses on digital forensics, endpoint security, intelligence and data encryption. Can some of this
batman security symbol
Robert Herjavec: Cybersecurity and the Need for Coolness (Is He BATMAN?) ARE CYBERSECURITY PERSONNEL BATMAN? Last week I listened to a pod cast by CyberCrime Magazine with Robert Herjavec. ( link to podcast ) I have tremendous respect for Robert and what he has accomplished with his company and the services they
Encase Forensics
ENCASE Digital Forensics Review Join iSG and Opentext for a fun night at Top Golf in Orlando, FL on August 14th at 5:00PM while learning about the gold standard digital forensics platform:  ENCASE Hear from our speakers who were engaged in cybersecurity/investigations at the federal and international levels. Learn from
lewis
Dallas Cowboys Lewis Neal to Present at Orlando Unique Security Event with Intelligence Services Group, LLC iSG ( https://iservicesgrp.com ) stated the event is to be held at the Top Golf location, 9295 Universal Blvd, Orlando, FL 32819 and will highlight the disruptive encryption technology called Key Shadowing by Hyperspace Security. 
Word cloud
Chance to Mentor I was fortunate last evening to attend my first mentoring event at the University of Central Florida, College of Business in Orlando. Not sure what to expect as I went in excited and anxious to learn about the program and have a chance to meet a few
Bob H
Should Security Teams Be Treated Like Law Enforcement Cyber Security Teams Stressed to the Hilt I read a Linkedin post yesterday from Mike Ebbers ( post ) postulating how we might make a comparison between law enforcement and information security personnel. His basic premise is law enforcement does not prevent 100%

Stay Up To Date

Keep up with ISG’s news, ideas, and tactics. You may unsubscribe at any time.