Internet of Things

– By: Dr. Gene Lloyd – The Internet of Things (IoT) is an exciting realm of technology that is bringing us so many convenient and incredible capabilities that can be used within our homes or businesses. But before we implement…

Secure Text Messaging

– By Dr. Gene Lloyd – Why are you not using encrypted text messaging? So much sensitive data is sent through text messaging every day, and it is easily readable by anyone in your phone company, and anyone else with…

Encrypting sensitive data

– By: Dr. Gene Lloyd – How are you storing your sensitive data? Is it sitting on the cloud somewhere for anyone to see? Is it buried deep in your internal network? Here’s the deal, there is one easy method…

Less is More

– By: Dr. Gene Lloyd – Have you ever wondered if the approach you are taking to security is actually the best possible method? Doing things the way we have always done them is not a great approach to managing…

Cloud Storage is not Always the Right Solution

– By Dr. Gene Lloyd – Cloud storage is so popular today and there are so many variations to this service that it can be easy to miss some important details about how this service works. Cloud storage offers us…

To Pentest, or Not

– By: Dr. Gene Lloyd – Is there any value in having an external organization run a penetration test against your network? Simply put, yes! This isn’t a service we provide at the Lloyd Research Institute so this will be…

What C-level leaders need to know about cyber security

– By: Dr. Gene Lloyd – Employees in technology divisions of companies generally understand that the company’s senior leaders don’t have the level of knowledge needed to make serious decisions regarding cyber security issues. These leaders shouldn’t be expected to…

Top 3 reasons systems are hacked

– By: Dr. Gene Lloyd – If you ask a group of cyber security experts how to secure a network, you are going to get a wide array of answers that may confuse you more than help. I have found,…