About.

Tony DeGonia

Solutions Architect | Cyber Security | Cloud Services
Highly Experienced Sales Engineer/Solution Architect seeking a new role to focus 100% effort on creating solutions that bring value to an appreciative employer and customer.

Contact Information

469 969 9422 (Cell)
Available anytime via email or cellphone.

12 I know what it is to be in need, and I know what it is to have plenty. I have learned the secret of being content in any and every situation, whether well fed or hungry, whether living in plenty or in want. 13 I can do all this through him who gives me strength.

- Philipians 4:12-13

Articles

Top Scoring Data Breaches

Top 10 Data Breaches Since 2013

Top Scoring Data Breaches Organization Breached Records Breached Date of Breach Type of Breach Source of Breach Location Industry Risk Score JPMorgan Chase 83,000,000 8/27/2014 Identity Theft Malicious Outsider United States Financial 10 Korea Credit Bureau, NH Nonghyup Card, Lotte Card, KB Kookmin Card 104,000,000 1/20/2014 Identity Theft Malicious Insider South Korea Financial 10 Target 110,000,000 11/4/2013 […]

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

2017-02-24T03:24:00-11:00Friday, February 24, 2017 Mohit Kumar Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers. From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company’s network without a […]

US government ‘hacked global bank system’

Dave Lee – North America technology reporter – April 15, 2017 A huge range of security weaknesses, said to be worth over $2m if sold on the black market, have been leaked online. The tools are said to have been created by the US National Security Agency (NSA), and accompanying documents appear to indicate a possible breach […]

Profiling Modern Hackers: Hacktivists, Criminals, and Cyber Spies. Oh My!

May 30, 2013 By Corey Nachreiner Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a hundred battles.” While the true intention of this quote is likely to remind us that knowing our […]

Don’t Lose Your Tax Return to Hacker Emails

April 13, 2017 By The Editor @ Secplicity.org Be on the lookout for fake IRS emails as tax season comes to a close. Phishers pretending to be from the IRS are flooding the internet. Last year the IRS saw a 400 percent increase in phishing and malware incidents in the first part of tax season, compared […]

Why one Republican voted to kill privacy rules: “Nobody has to use the Internet”

JON BRODKIN – 4/14/2017, 3:03 PM Republicans encounter angry citizens after killing online privacy rules. A Republican lawmaker who voted to eliminate Internet privacy rules said, “Nobody’s got to use the Internet” when asked why ISPs should be able to use and share their customers’ Web browsing history for advertising purposes. FURTHER READING How ISPs […]

Market Yourself! Building a Personal Brand for the Information Age

Avantika Monnappa – Published on Dec 31, 2015 If a company is successful, it means branding has played a major role. When a company’s identity is packaged and presented in a way that is familiar, pleasing, and attractive – it attracts its recurring and prospective customers – and that’s what company branding is all about.Organizations and […]

Why You Should Not Use Smartphone Fingerprint Readers

Joseph Steinberg – Published on February 4, 2016 While many smartphones today come with fingerprint readers, people should exercise caution in relying on these features – especially when security is important. Here are several reasons why: Your fingerprints are all likely all over your phone. You do hold it with your hands, right? How hard […]

5 Reasons SMBs Need MSSPs in 2017

Himanshu Verma –  March 6, 2017 For small and midsize businesses (SMBs), information security should be an “enterprise-grade” concern. Unfortunately, many SMBs believe they are not big enough to be targeted by cyber attackers. To the contrary, well-publicized breaches sustained by SMBs have shown that the threat is real, regardless of their industry or size. […]

STEM Girls Have Swagger

Barrett Sellers on April 10, 2017. Boys can play with dolls – GASP! It won’t turn them into a… GIRL. And, girls can play with code and strive for meaningful careers in cybersecurity without fearing that they will be seen as inferior. Yes, ladies… please stand up! The 2017 Global Information Security Workforce Study: Women […]

Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild

Sunday, April 09, 2017 Swati Khandelwal It’s 2017, and opening a simple MS Word file could compromise your system. Security researchers are warning of a new in-the-wild attack that silently installs malware on fully-patched computers by exploiting a serious — and yet unpatched — zero-day vulnerability in all current versions of Microsoft Office on fully-patched […]

Credit: Shutterstock

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

By Matt Hamblen  –  Senior Editor, Computerworld | APR 10, 2017 9:39 AM PT Sirens blared for 90 minutes early Saturday Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday. The city declared the sirens were activated Friday night in a […]

Video of the Month