April 8, 2020, “Researchers develop COVID-19 study you can participate in from home” Denver 7 News asked Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), to comment on the app released to help researchers collect data and the loss of...
January 2020 is a looming date for a lot of businesses, especially those that are in regulated industries. Unfortunately, on the exact opposite side are those that are excited at the increased odds of compromising your systems. During our penentration tests, we scan...
July 11, 2019: “Denver mom’s credit card used to pay for Uber trips without her knowledge” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), gives his take on how credit cards and banking information can be compromised. Here is the full...
July 2, 2019: “Hackers targeting Netflix, Hulu, other streaming services” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), explained to Denver Fox News why streaming service accounts are hacked, and he explains how an individual can...
The threats to computer security and user privacy have never been greater, and that has created enormous opportunities for people with the skills to fight back. Every week brings news of a new hacking attempt, a new data breach or a new ransomware demand, and millions...
Updated March 15, 2019: ”How Companies Get Your Information” Denver Fox News asks Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), on his expert opinion on how companies are collecting our information. Here is the full article:...
In the ever-growing online world we see new threats emerge every day. More people and businesses are getting compromised every day. We’ve put together a short list of things we consider to be the minimum when it comes to securing your home computer. 1. Install an...
Vulnerability Testing (aka Vulnerability Scans) is a vital aspect of Cyber Security to make sure your business is safe from hackers and other technology vulnerabilities. We can work with your IT Team to make sure your IT infrastructure is safe from being compromised,...
Surprisingly, most of the cyber security risk to your business is typically YOUR EMPLOYEES – not the actual hackers. Your users and your organization are the greatest security risk to your data and technology infrastructure. Do your employees know not to click...
What Is a cyber security Penetration Test? Penetration Testing is used to determine the true security of an organization, and demonstrate the highest risks to your technology infrastructure. This includes vulnerability to your email servers, customer information...