Eugene Bekker is the Chief Security Officer at EZShield. He originally joined EZShield in 2008 as a consultant and today he oversees the architecture of the core technology platform, as well as manages EZShield’s security and compliance program. Prior to EZShield, Eugene was the Chief Architect at PowerVision Corporation, an Information Technology and application development consultancy. He boasts over 20 years of experience in the areas of Information Technology and software engineering. Eugene holds a BS in Computer Science from the University of Maryland, Baltimore County and an MS in Computer Science from The Johns Hopkins University.
by Eugene Bekker - October is National Cybersecurity Awareness Month (NCSAM) and it’s the perfect time to implement a new educational training series for…
by Eugene Bekker - Unsecured Database Leaks Personal Records and Voicemails On October 1, 2020, security researchers at Comparitech discovered an unsecured database belonging…
by Kane Pepi - Is the Juice Worth the Squeeze? Nobody wants to run out of battery power while they’re out and about. In…
by Jay Leonard - Connected Vehicles & Cybersecurity Connecting vehicles to the Internet is no longer a far-fetched, futuristic idea. Once seen as an…
by Connor Brooke - eCommerce 101 eCommerce is exactly what it sounds like: putting traditional business commerce in an online arena. Businesses of all…
by Connor Brooke - Content Websites & Social Media Last month, we discussed the basic tools needed to stand up a business website. Here’s…
by Jay Leonard - Part 2: Secure websites on a small business budget The Small Biz Conundrum: Staying Current Online There’s nothing wrong with…
by Kane Pepi - Introduction: Creating an online presence for your small business Small Business Owners: The Unsung Heroes Small business owners can be…
by Kane Pepi - Free Wi-Fi & Business Network Security As a small business owner, you know that you must keep both your business’…
by Kane Pepi - The Need for Anti-Malware Protection The holiday season is an exciting time for both consumers and fraudsters. The hustle and…
by Kane Pepi - Employees & Your Business Security Program Last month, we discussed the importance of employee security awareness, and how employees play…
by Connor Brooke - Employees & Small Business Security Let’s face it: without the proper employee security awareness and training put in place, your…
by Connor Brooke - Employees and Personal Devices Most employees will bring at least one type of smart device – most likely a smartphone…
by Connor Brooke - Fraudsters go mobile Our smartphones send, receive and store tons of sensitive information about us. This includes the information-rich apps…
by Kane Pepi - What happened? On May 3, 2017, Google confirmed that a crafty phishing email disguised as a Google Doc invite was…
by Jay Leonard - What happened? On Friday, May 12, 2017, hackers launched the WannaCry (WannaCrypt) ransomware that has infected over 200,000 Windows users.…
by Eugene Bekker - What happened? Security experts recently discovered that criminals have begun distributing Pony malware disguised as Microsoft Publisher file attachments in…
by Connor Brooke - Are you tired of hearing about all the ways your business security is lacking, or how you’re not protecting your…
by Connor Brooke - Small business owners: protecting your business against cybercrime is now more important than ever. In 2015, the U.S. Director of…
by Kane Pepi - Fraudsters are constantly looking for new methods of stealing personal information, making traditional ways to spot illegitimate sites or potential…
by Kane Pepi - It’s always something …and so long as you plan for that reality, you’re on the right path. This is as…
by Jay Leonard - A Poignant Reminder Within less than one week into the new year (January 6 to be exact), Time Warner Cable…
by Kane Pepi - What happened? Hackers have a pretty dark sense of humor. Cybersecurity researchers detected a particularly nasty form of malware on…
by Connor Brooke - Ad-blocking software just can’t seem to stop popping up in the news lately. In September, tech giant Apple announced they…
by Kane Pepi - Say goodbye to the swipe! (And for good reason.) Now when you make a purchase at your favorite store you…
by Connor Brooke - In early July, nine different zoos including the Detroit and Cincinnati Zoo, suffered four-month-long data breaches. Visitors who used their…
by Jay Leonard - Fraudsters are always in the market for a lucrative new target. So what’s the most information-rich, security-poor victim they can…
by Connor Brooke - What happened? Macintosh security researcher Pedro Vilaca, discovered a deeply rooted vulnerability that allows hackers to gain access to certain…
by Connor Brooke - Point-of-sale (POS) systems are making headlines after four different POS providers suffered data breaches in the past year — exposing…
by Connor Brooke - Imagine that tomorrow you wake up to find out a virus has infected your laptop and all your files have…
by Connor Brooke - What happened? In recent weeks, technology researchers have discovered a decade-old security flaw, dubbed “FREAK,” that leaves Apple and Google…
by Kane Pepi - With the growing number of cyber attacks on businesses—including Target, Home Depot, Kmart, and Staples—attacks can easily seem commonplace in…
Join over 100,000 of your peers and receive our weekly newsletter which features the top trends, news and expert analysis to help keep you ahead of the curve