SHHH....THEY ARE LISTENING... How often do you talk with someone about a purchase and within a day your media feeds are bombarded with ads about that product? Google maintains that it doesn’t eavesdrop on smartphone users and that its technology is designed to preserve privacy. A company representative also emphasized that "the widespread belief that devices listen to users to serve ads has been thoroughly debunked." However, substantial evidence and experiments suggest otherwise. https://buff.ly/47jFUIo #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
The Tech Collective
IT Services and IT Consulting
Alpharetta, Georgia 679 followers
Your IT Consulting Partner and Premier Technology Broker
About us
The Tech Collective is a trusted premier technology broker. We help clients manage their technology needs, from procuring the right solutions to relieving pain points and making solutions last.
- Website
-
www.thetechcollective.net
External link for The Tech Collective
- Industry
- IT Services and IT Consulting
- Company size
- 2-10 employees
- Headquarters
- Alpharetta, Georgia
- Type
- Privately Held
- Founded
- 2022
- Specialties
- Cybersecurity, XCaaS, Connectivity, Cloud, SaaS, Managed Services, Market Place', Professional Services, Thought Leadership, XDR, MDR, EDR, Expense Management, Government SLED, Low Voltage Cabling, and Assessments
Locations
-
Primary
11877 Douglas Rd
102296
Alpharetta, Georgia 30005, US
-
Atlanta, GA 30005, US
Employees at The Tech Collective
-
Jim Watts
Strategic Business Leader | Transforming Organizations & Solving Business Challenges
-
Alan Rudd
It starts with a conversation and ends with your success!
-
Ralph Pasquariello, CLCS
Sr Partner, Cyber Liability Insurance Consultant Home of CARE-Report.com
-
Jagar Bhan
Penn Student ('28)
Updates
-
How to keep a #CISO's attention ? Last night in #ATL the CyberRisk Partners Chapter event was a hit. Thanks to Ed Pascua C-CISO, CISSP, for the terrific evening. ATL’s cyber|cloud security leaders enjoyed timely, relevant content, along with good food. City of Refuge, Inc. had a great presence with several of their success stories. Olivia Rose presented facts on how to align #securityinitiatives with your individual industry. Craig Sekowski and I enlightened and educated the audience with our CARE program (CyberInsurance Assessment and Risk Evaluation). As one of the prominent CISO attendees stated "this has been needed for quite some time" referring to our Financial Risk Quantification and Liability Benchmarking process. #CyberInsuranceAssessment, #Cybersecurity #CISO
-
CLOUD PROVIDERS ARE CULPABLE IN THE CURRENT STATE OF INSECURITY. The shared responsibility model has long been a cornerstone of cybersecurity. However, modern advancements and increasing complexities, particularly in the cloud, are starting to undermine our capacity to effectively share responsibility for achieving secure outcomes. As technology grows more complex, the shared responsibility model becomes increasingly strained. When physical technologies become outdated or vulnerabilities are discovered, we often confront a binary decision: continue using the flawed system or replace it entirely. Here is an interest article that discusses this perspective and provides some insights. https://buff.ly/4cZ3dsk #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
HAPPY BIRTHDAY, CYBER INSURANCE!!! 🍰 🥳 🎉 While many industry experts see the rise in cyber insurance as a reaction to the increasing frequency of random attacks, the first cyber policy was actually conceived and developed in 1997 in response to risks identified by financial regulators at the time. Originally introduced to guard against the relatively unknown threat of internet fraud, cyber insurance has now become the most rapidly expanding and in-demand sector in the global insurance market. https://buff.ly/3BdHD3A #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
TOO MANY SECURITY TOOLS? The cybersecurity landscape is ever-evolving, with cybercriminals continuously refining their tactics. In response, organizations are pouring resources into cybersecurity tools, aiming to create an impenetrable defense around their digital assets. However, the notion that simply adding "one more cybersecurity tool" will magically secure your attack surface and improve protection is a perilous misconception. The abundance of cybersecurity tools has fostered a false sense of security. Many organizations assume that by implementing firewalls, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are sufficiently protected. However, this strategy not only overlooks the core issue of the attack surface but also introduces significant third-party risks into the equation. https://buff.ly/4gjireh #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
Please come to Thursday's CyberRisk Partner's Chapter Event. Ralph Pasquariello, CLCS, and Craig Sekowski will present "Why Do CFOs Fail When Selecting Cyber Insurance." Details below: Who: ATL's Cyber|Cloud Security Professionals What: Networking + Good Food + Good Drink + Great Prizes Given Away Venue: 3550 Lenox Rd NE, 21st Floor, Atlanta, Georgia 30326. Dinner Venue: Zakia Modern Lebanese Restaurant 3699 Lenox Rd NE Ste 3, Atlanta, GA 30305 (4 min away) When: Thu, Sep 12, 300pm Register HERE: https://lnkd.in/e5DRBYqs #CyberRiskPartners #TheTechCollective #CARE #CyberInsurance
-
AI IS ALL THE RAGE, FOR BOTH THE GOOD GUYS AND THE BAD ONES.... AI technology is all the rage, with many unique applications evolving. However, like any technology, there are those bad actors leveraging the technology for nefarious applications with financial gain in mind. Researchers at Indiana University Bloomington reported finding 212 malicious large language models (LLMs) on underground marketplaces between April and September. One of these models, WormGPT, generated an estimated $28,000 in profit for its operator within just two months. This highlights both the temptation for malicious actors to bypass AI safeguards and the significant demand driving these activities. https://buff.ly/4d2zU7U #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
GOOGLE SHEETS BEING USED TO STORE STOLEN DATA... A new malware campaign is distributing a previously unknown backdoor called "Voldemort" to organizations across the globe, posing as tax agencies from the U.S., Europe, and Asia. More than half of the targeted organizations are in the insurance, aerospace, transportation, and education sectors. While the identity of the threat actor behind this campaign remains unknown, Proofpoint security team suspects that the primary goal is cyber espionage. https://buff.ly/3TbwwRn #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
DO YOU LIKE YOUR DIGITAL WALLET? NOW THERE'S A HACK FOR THAT.... Android users need to be aware of potential exposure to their digital wallet. Eset, a cybersecurity software firm, has discovered a new type of financial attack targeting Android devices. This attack attempts to deceive users through calls, texts, or ads, leading them to install malware by impersonating their bank and directing them to a fraudulent Google Play Store page. When activated, the malware can capture payment data from a nearby card using near field communication (NFC), also known as "tap" or "tap to pay." This data is relayed from the card to the infected phone and then to an attacker’s device. The attacker can then exploit NFC features at payment terminals to make unauthorized transactions. In some cases, the attacker could even access a victim’s bank account at an ATM without needing the physical card, provided they can obtain the victim's banking PIN through social engineering or phishing tactics. https://buff.ly/3X897RM #CARE #CyberinsuranceAssessment #TheTechCollective #Cybersecurity #assessment #technologyinfrastructure #optimization #leadership #managementconsulting #cloud
-
THE TECH COLLECTIVE OUT ON THE TOWN. Last Thursday, The Tech Collective attended another great event sponsored by the HIMSS Georgia Chapter on Cyber Security. The star studded panel including not only Security Leaders from the Atlanta business community, but representation from both the Federal Bureau of Investigation (FBI) and U.S. Department of Homeland Security. Great discussion!