CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
The Dangers of Sharing Email and Cloud Accounts

The Dangers of Sharing Email and Cloud Accounts

Watch or listen to our Blogcast HERE. In small and medium-sized businesses, it’s common to share email and cloud accounts.

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

View/listen to our blogcast here. In today’s interconnected digital landscape, phishing has become an ever-present danger, infiltrating our social media.

US Government’s Response to Foreign Cyber Threats

US Government’s Response to Foreign Cyber Threats

View/listen to our blogcast here. In our increasingly interconnected digital world, the threat of cyberattacks from foreign actors continues to.

AI Under Attack: Microsoft & OWASP Highlight Emerging AI Security Threats

AI Under Attack: Microsoft & OWASP Highlight Emerging AI Security Threats

View/listen to our blogcast here. Artificial Intelligence (AI) is rapidly transforming the business landscape, offering unprecedented efficiencies and innovations. However,.

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

In 2023, a well-known New York hospital fell victim to a significant ransomware attack, ultimately affecting the personal data of.

Navigating Compliance for Medical Providers in New York Part 1 of 2

Navigating Compliance for Medical Providers in New York Part 1 of 2

A Guide to HIPAA, NY SHIELD Act, and PCI Regulations Medical providers in New York face a complex web of.

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

Cybercriminals are constantly devising new and sophisticated methods to exploit unsuspecting victims. Among these threats, fake tech support scams, unfiltered.

New Report Shows Unsafe Employee Behaviors Put Organizations at Risk

New Report Shows Unsafe Employee Behaviors Put Organizations at Risk

Cybersecurity has become a critical concern for organizations of all sizes. Recent findings from a CyberArk study reveal troubling trends.

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Cybercriminals have developed a sophisticated phishing campaign using corrupted Microsoft Word documents to bypass traditional security measures. This novel attack,.

The New Type of Warfare

The New Type of Warfare

Cybersecurity in the Age of Digital Conflict In today’s interconnected world, the battlefield has shifted from physical terrain to the.