Our Thoughts On

Sort by


Stephen Bish

Articles 1 - 8 of 8

Authentication Technology Provider Okta Breached by Lapsus$ Hacking Group

Learn about the recent cyber attack on authentication technology provider Okta by the Lapsus$ hacker group.

Apache Log4j Vulnerability Update

Learn more about the Apache Log4j remote code execution vulnerability and why this is already regarded as one of worst software flaws in years.

What Are The Top Ten Cybersecurity Strategy Mistakes of 2021?

Learn about the top ten cybersecurity strategy mistakes organizations are making in 2021 and best practices to avoid these common pitfalls.

Chronicles of a Penetration Tester

Learn about recent findings from our penetration testing team and the importance of assessing cyber risks in 2020.
Register to receive our weekly newsletter with our most recent columns and insights.

Stopping Ransomware Cold: Lessons from the Front Lines

Learn more about lessons from the front lines and how we are stopping ransomware.

The Physical Side of Cybersecurity

At Schneider Downs, we always strive to uphold our responsibility to serve as trusted cybersecurity advisors to our clients and to the community at large.

Don't Be Lulled Into a False Sense of Security

In my journey as a cybersecurity professional, I provide a wide variety of services to an even wider variety of clients. Within those services, there is

Is your home router hacked?

At Schneider Downs, we understand that cybersecurity threats to our clients will sometimes extend to devices and systems outside their IT purview. As the
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.