TheOCDTech's profile picture. Helping our clients with IT Security Advisory & Assurance services. (SOC2, pen testing, regulatory compliance, etc)

OCD Tech

@TheOCDTech

Helping our clients with IT Security Advisory & Assurance services. (SOC2, pen testing, regulatory compliance, etc)

On June 13, ransomware group 8Base exposed evidence of a significant data breach targeting a large Midwestern automotive group, including financial statements, driver’s licenses, and addresses. Read the complete article: ocd-tech.com/2023/06/17/aut…

ocd-tech.com

Auto Dealer Latest Target of Ransomware

On June 13, 2023, ransomware group 8Base exposed evidence of a significant data breach targeting a large Midwestern automotive group. The ransomware group claims to have executed a successful...


Obtaining CISA certification by @ISACANews , can be a valuable investment in your career as an IT security professional. But what does it take to become certified, and what are the benefits of doing so? Visit @TheOCDTech : ocd-tech.com/2023/05/26/cis…

TheOCDTech's tweet image. Obtaining CISA certification by @ISACANews , can be a valuable investment in your career as an IT security professional. But what does it take to become certified, and what are the benefits of doing so?
Visit @TheOCDTech : ocd-tech.com/2023/05/26/cis…

Since the extension of the FTC Safeguards June 9th deadline was announced, the @FTC has gone silent. Many are wondering what the significance is and what is next? Read this interesting article by Nicholas Reed and David Cantor-Adams at @TheOCDTech #blog ocd-tech.com/2023/05/22/ftc…

TheOCDTech's tweet image. Since the extension of the FTC Safeguards June 9th deadline was announced, the @FTC  has gone silent. Many are wondering what the significance is and what is next?
Read this interesting article by Nicholas Reed and David Cantor-Adams at @TheOCDTech  #blog
ocd-tech.com/2023/05/22/ftc…

💡What is next for AI? Compliance with the NIST AI Risk Management Framework is voluntary, but offers a powerful and relevant tool to organizations. Learn more about National Institute of Standards and Technology (NIST) framework at OCD Tech #blog: ocd-tech.com/2023/04/14/nis…


PAM is one of the most critical aspects of a strong information security program that every company needs to incorporate to mitigate the risks. Visit @TheOCDTech #blog and keep your business protected ocd-tech.com/2023/02/28/pam…


Considering hiring a Managed Security Service Provider(MSSP) and having doubts choosing the best fit for your business? @TheOCDTech has10 Questions you should ask while evaluating potential providers ocd-tech.com/2023/02/07/man… #cybersecurity #mssp #data #clients #compliance


If you are a small company and need advice on your 2023 IT Security budget, you must read this article by Jill Kamperides and Michael Hammond @TheOCDTech , at @masstlc Security Community. lnkd.in/eMk7cuD2 #cybersecurity #assessment #mfa #threat #theocdtech #community


Congrats to Jill Kamperides & Adam Maraziti! "Best of 2022" @PenTestMag, for their articles on Windows Privilege Escalation: The Concepts of Hijacking Execution Flow and Understanding Microsoft Office Trusted Locations Workflow and How It Can Be Exploited. lnkd.in/dD8j8Qzc


Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier to crack. Learn about passwords & multi-factor authentication in our latest blog post. #2Factor #MFA #passwords #cybersecurity ocd-tech.com/2022/07/28/mor…

TheOCDTech's tweet image. Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier to crack.  Learn about passwords & multi-factor authentication in our latest blog post.  #2Factor #MFA #passwords #cybersecurity 

ocd-tech.com/2022/07/28/mor…

Achieving a SOC 2® is even more necessary for today’s service organizations. There are 2 types to consider: SOC 2®Type 1 & SOC 2®Type 2. Which one is right for your organization? Learn more in our latest post. ocd-tech.com/2022/07/18/soc… #soc2 #cybersecurity #serviceorganization

TheOCDTech's tweet image. Achieving a SOC 2® is even more necessary for today’s service organizations.  There are 2 types to consider: SOC 2®Type 1 & SOC 2®Type 2.  Which one is right for your organization? Learn more in our latest post.

ocd-tech.com/2022/07/18/soc…

#soc2 #cybersecurity #serviceorganization

Carnival Cruise Line was fined $5 Million by the State of New York for “significant” #CyberSecurity violations following 4 security breaches. These violations exposed a large amount of customer data. Learn more in our latest post. #NYDFS #databreach ocd-tech.com/2022/07/11/car…

TheOCDTech's tweet image. Carnival Cruise Line was fined $5 Million by the State of New York for “significant” #CyberSecurity violations following 4 security breaches.  These violations exposed a large amount of customer data. Learn more in our latest post. #NYDFS #databreach

ocd-tech.com/2022/07/11/car…

Think the door is closed because Nmap said so? There may actually be more going on than meets the eye. Nmap plus a Pen Test provides you with the full picture ensuring the highest level of protection. #Nmap #MythVsReality #MythDebunked #PenetrationTesting #PenTest #datasecurity

TheOCDTech's tweet image. Think the door is closed because Nmap said so? There may actually be more going on than meets the eye. Nmap plus a Pen Test provides you with the full picture ensuring the highest level of protection. 

#Nmap #MythVsReality #MythDebunked #PenetrationTesting #PenTest #datasecurity

Our latest blog post continues our discussion on #OSINT - both old and new school - and reviews some of the methods threat actors use to obtain private information on and offline. ocd-tech.com/2022/06/14/won… #opensourceintelligence #datasecurity #privatedata #itaudit

TheOCDTech's tweet image. Our latest blog post continues our discussion on #OSINT - both old and new school - and reviews some of the methods threat actors use to obtain private information on and offline.

ocd-tech.com/2022/06/14/won…

#opensourceintelligence #datasecurity #privatedata #itaudit

Learn about the Trust Services Categories that can be included within the scope of a SOC 2® examination and when a service organization may consider additional Trust Services Categories in our latest blog post. #soc2 #socreports #cybersecurity #itaudit ocd-tech.com/.../which-soc-…

TheOCDTech's tweet image. Learn about the Trust Services Categories that can be included within the scope of a SOC 2® examination and when a service organization may consider additional Trust Services Categories in our latest blog post.

#soc2 #socreports #cybersecurity #itaudit

ocd-tech.com/.../which-soc-…

Open source intelligence is often seen as a modern age development. However, it found its roots long before the internet. Our latest post explores the difference between old & new school #OSINT ocd-tech.com/2022/05/10/old… #phishing #darkwebmonitoring #socialengineering

TheOCDTech's tweet image. Open source intelligence is often seen as a modern age development.  However, it found its roots long before the internet. Our latest post explores the difference between old & new school  #OSINT  

ocd-tech.com/2022/05/10/old…

#phishing #darkwebmonitoring #socialengineering

Often organizations check all the necessary boxes in terms of IT Security, However one thing is often overlooked - the human firewall. Learn more in our latest post. ocd-tech.com/2022/05/02/the… #humanfirewall #databreach #phishing #socialengineering #training #security #tech

TheOCDTech's tweet image. Often organizations check all the necessary boxes in terms of IT Security,  However one thing is often overlooked - the human firewall.  Learn more in our latest post. 

ocd-tech.com/2022/05/02/the… 

#humanfirewall #databreach #phishing #socialengineering #training #security #tech

Gregory Haapaoja & Emily C. attended @KnowBe4 's #KB4CON last week to gain the latest info on how we can better help our clients protect their assets against one of the greatest #vulnerabilities of all: The Human Element! #securityawareness #socialengineering #cybersecurity

TheOCDTech's tweet image. Gregory Haapaoja & Emily C. attended @KnowBe4 's #KB4CON last week to gain the latest info on how we can better help our clients protect their assets against one of the greatest #vulnerabilities of all: The Human Element!

#securityawareness #socialengineering #cybersecurity
TheOCDTech's tweet image. Gregory Haapaoja & Emily C. attended @KnowBe4 's #KB4CON last week to gain the latest info on how we can better help our clients protect their assets against one of the greatest #vulnerabilities of all: The Human Element!

#securityawareness #socialengineering #cybersecurity

Learn more about the importance of having a Privileged Access Management (PAM) strategy in place especially during these uncertain times in our most recent blog post. #PrivilegedAccessManagement #PAM #cybersecurity #databreach ocd-tech.com/2022/04/13/its…

TheOCDTech's tweet image. Learn more about the importance of having a Privileged Access Management (PAM) strategy in place especially during these uncertain times in our most recent blog post. 

 #PrivilegedAccessManagement #PAM #cybersecurity #databreach

ocd-tech.com/2022/04/13/its…

As tensions rise amid the conflict in Ukraine, CI operators should be on high alert. Here are 6 best practices to keep CI safe. ocd-tech.com/2022/03/31/why… #criticalinfrastructure #vulnerabilityassessment #pentesting #privilegedaccessmanagement #securityawarenesstraining

TheOCDTech's tweet image. As tensions rise amid the conflict in Ukraine, CI operators should be on high alert.  Here are 6 best practices to keep CI safe.  

ocd-tech.com/2022/03/31/why…

#criticalinfrastructure #vulnerabilityassessment #pentesting #privilegedaccessmanagement #securityawarenesstraining

Loading...

Something went wrong.


Something went wrong.