We recently spoke with Leland Quirk, one of our seasoned project managers who specializes in IT security and identity management. His ability to navigate complex projects and deliver tailored solutions…
Read More
On May 19, Microsoft announced that it would be ending support for Internet Explorer (IE) 11 starting in June 2022. This move is a long time coming. In 2015, Microsoft…
Read More
Oracle APEX has built-in security that is incredible at preventing different unauthorized manipulation attacks. The benefits far outweigh the drawbacks, but there are some circumstances where it is necessary to…
Read More
Mike Benz is the IT Director at Kraus-Anderson Construction Company and a graduate student in the University of Minnesota’s Master of Science in Security Technologies (MSST) program. Below, he shares…
Read More
Security concerns are top-of-mind for many IT decisions, and rightfully so. The recent slew of hacks, attacks and breaches have affected everything from small websites to large troves of valuable…
Read More
“What’s your password?” you ask as you patiently wait with fingers poised over a keyboard for your friend to give you the answer. “It’s password1234” Scenes like this are all…
Read More
As data breaches continue, how can organizations protect their valuable information? In 2013, 40 million credit cards and 70 million customer addresses, phone numbers and other personal data were stolen…
Read More