Blog
Sharing the latest news from emerging cyber threats to CMMC, best practices and cybersecurity insights, our blog features resources for executives and business leaders from our cybersecurity expert CISOs.

What Happens to Your Data When Using Otter.ai
We don’t allow note-taker apps during company meetings. Last week, one of our new people had their Otter.ai notetaker app come in before the meeting. It was promptly dismissed, and after the meeting, I took a few minutes to explain ‘you have no idea where that data goes.

HiatusRAT: The Evolving Threat to IoT Devices
A PRC-based threat actor active since 2022 has recently expanded its attack scope to include DVRs and IOT Cameras. These same actors have, in the past, targeted the DIB (Defense Industrial Base) of the US and Taiwan.

CMMC (Cybersecurity Maturity Model Certification) takes effect 12/16/24. Are you ready?
The Cybersecurity Maturity Model Certification (CMMC) becomes mandatory on December 16, 2024. Trusted Internet helps your business prepare with confidence.

Where Are VPNs Illegal or Restricted? A Global Guide to VPN Usage
Where Are VPNs Illegal or Restricted? A Comprehensive Guide to VPN Laws Worldwide

From the Digital Shadows –the true story of a home WIFI invasion

Are Your Home Security Systems Spying On You?
Lessons learned when selecting an XDR.