technology Archives - ThreatWarrior
ThreatWarrior: Design Principles

ThreatWarrior: Design Principles

At ThreatWarrior, we often collaborate on key projects. One that requires us to be aligned internally is our thinking on the core elements of our product strategy, or our design principles.  First and foremost, everything we do as a company has one bottom-line...
National Cybersecurity Awareness Month

National Cybersecurity Awareness Month

If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber attacks should already be a paramount issue. However, if you have not been the victim of a hack or a phishing expedition, you may think that...
Phishing Explained: Don’t Get Hooked

Phishing Explained: Don’t Get Hooked

If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...
Cybersecurity: One Word or Two?

Cybersecurity: One Word or Two?

Everyone knows the term “security” has evolved past the routine protection of the home or a person’s physical property. We’re also all aware that the word “cyber” is front and center in the realm of Information Technology. Information security is now a...