This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law enforcement with checks and balances by the FBI, senior leadership at the FBI, etc.

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.

This 12 minute Ted Talk outlines how the IoT is making investigations easier. Digital forensics looks for a trail of electronic evidence from the research on how to perform a …

This 16 minute Ted talk outlines the work of a digital forensics investigator. He describes his work as the collection, analysis, and reporting of electronic data that is preserved.

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online.

This 3 minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as …

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …

This great 1 minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems or steal information. The video outlines various methods …

This video details what could happen if you follow criminals suggested actions and logged into their spoofed website and lost your credentials or installed malware on your computer by running …

https://www.youtube.com/embed/vOzMuCardcQThis video outlines the dangers of inserting random USB keys in your computer. Security researchers have proven that a very powerful and effective attack on businesses and individuals is to …

This video provides a very good overview of LastPass password manager and its various features from secure password generation to storing credentials for websites, to storing encrypted Secure Notes.

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in the summer of 2017. This video outlines how the US’s own National Security

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place. It outlines how to keep computer security up-to-date with patching, …

This video outlines the common WiFi security risks unsuspecting public wifi users are liable to face. This 3 min video outlines steps to protect yourself on public wifi including verifying …

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …

https://www.youtube.com/embed/xLyPhLHlyXEThis Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation states, on users social media accounts. The security analysts reminds us to use strong …

https://www.youtube.com/embed/UjENRK4UwYIComputer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …

https://www.youtube.com/embed/ORS9DPKJlksComputer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …

https://www.youtube.com/embed/qbuSZ9rOKNkHospitals must train all their employees on how to remain safe while performing their healthcare job responsibilities. From safely lifting patients to dealing with universal precautions to protect against fluid …

https://www.youtube.com/embed/sxybmE1rrZgThe FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That staggering statistic is what this …

This introductory video outlines the VITAL Tech Services platform, what the most common attacks are against individuals and businesses, and previews some of the topics that VITAL Tech Services will be presenting to you.

The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short).

This VITAL Tech Services core curriculum video outlines the common attack patterns found in phishing attacks and creates a clear rubric or set of questions to ask oneself in order to quickly …

Remote access solutions are also known as Virtual Private Networks. These are encrypted closed-loop encrypted connection between your home computer or Laptop and your business’s remote access solution.

This VITAL Tech Services core curriculum video outlines the three common ways hackers attack wifi connections and what individuals can do to protect themselves while accessing public wifi networks.https://www.youtube.com/embed/NvGnyJ4C0a0,

This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the VITAL Tech Services Core Curriculum …

In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web…

The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …

This brief video shows proof of concept exploit code that takes advantage of a critical vulnerability in the Remote Desktop Protocol. In this video a remote hacker attacks an unpatched …

Two-factor authentication is the Gold Standard of how to securely authenticate identities. All banks of long required two-factor authentication of clients calling their support lines, logging into online banking portals, …

The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …

Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …

Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover. Together they published data …

This video dives into password managers and how they protect your most critical and sensitive data – your passwords. This video explains some of the more sophisticated protections provided by …

Calcualte your cost estimate below

[estimation_form form_id="2"]