Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Startups: Secure Staff Devices
Startups: Secure Staff Devices It never fails…Every day, workers use the same laptop in the office used at home. Others bring their phones and connect to company Wi-Fi. While it may seem innocuous, this habit can cause profound issues to the corporate network – and...
Get Employees on Board With Cybersecurity
How to Get Employees on Board With Cybersecurity Compliance October is National Cybersecurity Awareness Month, which means now is the time to ensure employees are fully compliant with cybersecurity measures in your business. However, it's not enough to merely...
Loyalty Program Information Breach
Dunkin’ Donuts’ loyalty program was hit with a credential stuffing attack that targeted names, email addresses, 16-digit DD Perks account numbers and DD Perks QR codes. Dunkin’ Donuts may have just launched its first double-filled doughnut, but another doubling up is...
Is Your VPN Leaking Your IP Address
Is Your VPN Leaking Your IP Address (Virtual Private Networks) are great for security, but one of the big reasons many people use one is to mask or change their IP address. Thus, one of the essential motivations to utilize a VPN is to conceal your actual IP address....
Are Password Managers Safe?
A new study has identified security flaws in five of the most popular password managers. Now for some counter-intuitive advice: I still think you should use a password manager. So do the ethical hackers with Independent Security Evaluators who came to me with news of...
Stay Safe on Public Wi-Fi Networks
Stay Safe on Public Wi-Fi Networks Free Wi-Fi is available in shopping malls, airports, restaurants, coffee shops, libraries, public transport, hotel rooms - you name it. These networks are used by millions of people on a daily basis. According to a recent survey by...
Lawsuits Surge Over Websites’ ADA failures
Lawsuits Surge Over Websites’ ADA compliance failures Businesses with websites that can’t be navigated by the blind are getting pummeled with lawsuits. The new frontier in federal disability litigation has accelerated dramatically in recent years, with some companies...
Penetration Test and Vulnerability Assessment
The Difference Between a Vulnerability Assessment and a Penetration Test There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to be that some believe a thorough Penetration Test involves...
Domain Hijacking Attacks
The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites. Under the directive, which appeared a week after a US-CERT warning on the same topic,...
Massive data breaches leak 773 million email addresses, 21 million passwords
The best time to stop reusing old passwords was 10 years ago. The second best time is now. In one of the largest public data breaches, a collection containing more than 87 gigabytes of personal information was leaked online. The data dump, titled "Collection #1," was...
Top 20 Christmas Traditions Ideas
1. DECORATE THE HOUSE ON DEC 1ST Having the whole month of December to enjoy the decorations. And growing up I loved that there was never a question of WHEN we would decorate. We always got the tree up and all the lights on as soon as December hits. To this day on Dec...
5 Emerging Security Technologies set to level the Battlefield
The war between data defenders and data thieves has been described as a cat-and-mouse game. As soon as the white hats counter one form of black-hat malicious behavior, another malevolent form rears its ugly head. How can the playing field be tilted in favor of the...
The History of Veterans Day
Veterans Day gives Americans the opportunity to celebrate the bravery and sacrifice of all U.S. veterans. Please join Liquid Video Technologies in giving thanks to the brave men and woman, past and present for their service to our country. A Brief History of Veterans...
Video Games that Use Security Cameras in Gameplay
[vc_row][vc_column][vc_column_text]It may be hard to believe, but video games have been with us for almost 50 years now. Coincidentally, that is about the same time CCTV cameras have been around with both technologies starting to come into their own in the 1970s. The...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments