800 797 5478

free quote

Liquid Technology Blog

Hacking is no longer a naughty word. Google, Facebook, and Microsoft are employing hackers to help them test products and services. Even the government employed hackers to test their cyber security. Could employing a hacker help your company? Below are five examples of how organizations are using friendly hacking to improve their business: Facebook Bug Bounty In 2013, Facebook had a rude awakening. A computer science student exploited the social network’s vulnerability and posted a letter to Mark Zuckerberg’s page. The student Khalil Shreateh tried to notify the team prior […]


In 2009, President Obama hired the first Chief Information Officer of the United States, Vivek Kunda. Hiring Kunda was not the only change the Obama administration made regarding technology. Here is a list of five things that changed about the U.S. government’s technology during Obama’s presidency: 1.New Tech Titles The Obama administration hired tech professionals to implement the government’s tech initiatives. Obama hired a former eBayer and Microsoft cybersecurity expert, Howard Schmidt, to be the first CTO. Mikey Dickerson, a former Googler, became the administrator of the U.S. Digital Service. […]


Do you have a cybersecurity framework in place? Or are you looking to build a better plan for securing your organization’s data for 2017? Well, consider utilizing the NIST (National Institute of Standards of Technology) Baldrige Cybersecurity Excellence Builder. NIST created the Baldridge Cybersecurity Excellence Builder to help enterprises evaluate the impact and effectiveness of their cybersecurity risk management initiatives. NIST’s Cybersecurity Framework and the Baldrige Performance Excellence Program served as the model for the self-assessment tool. The NIST program provides a framework to improve organizations performance and get sustainable […]


The United States is one of the only countries still exporting e-Waste to developing countries. The U.S. signed the Basel Convention but has yet to ratify it. The Basel Convention is an international treaty created to prevent the trade of hazardous waste between nations. BAN (Basel Action Network) is petitioning President Obama to change the U.S. e-Waste policies. BAN Startling e-Waste Discovery BAN started the e-Trash Transparency Project to collect data on the e-Waste recycling process. BAN’s project uncovered some startling results. 40% of America’s e-waste is shipped overseas. Not […]


Pokemon Go was a huge phenomenon this summer. In July, the US reported there were 15 million downloads of the app. The popularity of the augmented reality app has made it a target for cyber criminals. Pokemon Go is a Security Risk When Pokemon Go first launched users automatically granted the app full access to their Google accounts. The sign-up process made users’ Google accounts vulnerable. Giving an app full permission can pose major security issues for a company. If a business account is connected, the app would have access […]