TruBlog

Critical Security Information For Security Conscious Companies

Email Us - 877.583.2841 - Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

  • This field is for validation purposes and should be left unchanged.

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

Lip Kits = Loss of Security

If you happen to be a make-up connoisseur and an IT specialist then you have probably heard about the security breach that happened to a very famous reality TV star. Kylie Jenner has recently popped up again due to her new makeup line, Kylie Cosmetics. Kylie released her line of lip kits which retail at… Continue Reading

Upcoming Webinar: Building a Security Program, Part 4 – Control Freak – Implementing Security Controls

An essential component for ensuring security involves network segmentation and configuration. Without the proper configuration of your system, you open your network up, both internally and externally, to cyber threats. In this webinar “Building a Security Program, Part 4 – Control Freak – Implementing Security Controls”,  experts will discuss the best practices for setting up your… Continue Reading

Black Hats. White Hats. Gray Hats.

No, we aren’t talking about men’s fashion items. Instead we are talking about the different ways that hackers are identified. It couldn’t be simple, we had to categorize them in order to tell the ‘good’ from the ‘bad’ and of course the in-between. Continue Reading

Upcoming Webinar: All About TruShield

 Who Is TruShield? TruShield takes a unique approach in the cyber security industry. We offer full service, concierge solutions but what does that really mean? In this webinar we dive deep into TruShield’s methodology and you will learn the what, how, and why of our business. The webinar is “All About TruShield”.   Continue Reading

Which Firewall Are You?

Stateful vs. Next Generation Firewall Firewalls are an important part of any network security platform and control the incoming and outgoing traffic based on a set of rules. Firewalls can be either hardware or software based and there are many different types of firewalls, especially once customization takes place. For now we are going to… Continue Reading

Cyber Security and Your Investments

Cyber security is becoming an increasing concern for many different industries. One industry that is starting to see the potential risks and issues surrounding cyber security is that of hedge funds, investment firms, funds of funds, venture capital firms, and family offices.These are organizations deal with a substantial amount of money and transactions on a… Continue Reading

5 Tips for Diversity Recruitment in Cybersecurity

According to Women in Cybersecurity (WiCyS), the cybersecurity workforce is comprised of approximately 7% African-Americans, 5% Hispanic-Americans and 10% women, reflecting a serious need for diversity in the industry. While those numbers are disappointing, the good news is that there are ample opportunities to increase those percentages.  There are various techniques and resources available to… Continue Reading

The Ultimate Cheat Sheet on Personal

Do you pay attention to the locked or unlocked padlock in the address bar of your browser? Or if the letters ‘https’ or ‘http’ appear after the padlock? Both of these may seem minimalist and seemingly unimportant, however you could be amazed at what they actually mean to you, as an Internet user. Continue Reading

The Panama Papers

The Panama Papers is the biggest leak in history regarding a massive operation that enabled the elite to hide their wealth through a workaround. The Panama Papers is surrounded by corruption, deceit, and people who had something to hide. At the forefront of this leak you will find a Panama law firm, Mossack Fonseca and… Continue Reading

Copyright © 2017