top of page

BLOG
Your resource for the latest IT news and events


The “Deepfake CEO” Scam Why Voice Cloning Is the New Business Email Compromise (BEC)
The phone rings, and it’s your boss. The voice is unmistakable; with the same flow and tone you’ve come to expect. They’re asking for a favor: an urgent wire transfer to lock in a new vendor contract, or sensitive client information that’s strictly confidential. Everything about the call feels normal, and your trust kicks in immediately. It’s hard to say no to your boss, and so you begin to act. What if this isn’t really your boss on the other end? What if every inflection, e

Jonanna Mason
Feb 175 min read


6 Ways to Prevent Leaking Private Data Through Public AI Tools
We all agree that public AI tools are fantastic for general tasks such as brainstorming ideas and working with non-sensitive customer data. They help us draft quick emails, write marketing copy, and even summarize complex reports in seconds. However, despite the efficiency gains, these digital assistants pose serious risks to businesses handling customer Personally Identifiable Information (PII). Most public AI tools use the data you provide to train and improve their models.

Jonanna Mason
Jan 134 min read


How to Use AI for Business Productivity While Staying Cyber-Secure
Most organizations have realized that AI is not a sentient system looking to take over the world, but rather an invaluable tool. They have come to utilize it to improve their productivity and efficiency. AI solutions have been installed at an astounding rate. Some are used to automate repetitive tasks and to provide enriched data analysis on a previously unrealized level. While this can certainly boost productivity, it is also troubling from a data security, privacy, and cybe

Jonanna Mason
Nov 4, 20254 min read

bottom of page
