Since 1995, Mike has served as President, Vice President of Marketing & Sales, Director of Professional Services,and Consultant for PaperClip Incorporated. In his current role, he is responsible for strategic direction,operations, and corporate communications. Prior to joining PaperClip Software, Mike was the Executive Vice President and co-founder of CMF Design System, a custom software and systems integration firm. Mike received a Bachelor of Science from Rowan University and served as a Captain in the United States Marine Corps.



Apr 15, 2020
Mike Bridges

Things that make you go hmmm...

I’ve always been curious about who’s making the money from cybercrime. Among the players we have Nation States, Organized Crime, Small teams to Individuals, so let’s follow the money. To keep this simple and about money, we’ll discuss the three most active cyberattacks, Phishing, Ransom, and Identity Thief. Each of these attacks has a list of usual suspects, Phishing is a small group or individuals, Ransom and Identity Theft are larger groups like Organized Crime and Nation-States.  According to McAfee, the top Nation-States are China, Russia, North Korea, Iran, and Central America.  All these groups combined in 2019 realized $1.5 trillion in money stolen, good guys to bad guys. The good guys also end up paying $4.0 trillion in money to clean up the mess; global cybercrime costs $5.5 trillion in 2019 in an $80 trillion global economy.

Feb 17, 2020
Mike Bridges

My company was hit again with a Business Phish this February targeting a new hire, same as last time.  This is why it so important to have cyber training the first training a new employee receives.  In my cases, new employees were targeted within a few weeks of coming on board.  In each case, the new-be receives an email from an executive manager.  The request is simple, get bank cards, gift cards and so on and email back the transaction numbers so the receiver can cash in and the new-be just lost hundreds of dollars or more.  This is a “Business Phish” and the simplest to execute. 

Jun 14, 2019
Mike Bridges

Living in a business world of confidential data, documents and managing who can have access to the same, is a daunting task. With the world of identity theft simple logins and passwords don’t cut it anymore. People who are trusted with securing the perimeter need more help and that change is coming quickly in the form of “Two Factor Authentication” (2FA). 2FA is not new. What’s new is its requirement in daily business application logon. Example, today case managers login to their solution, enter their password and go to work. What’s coming as “Best Practices” is introducing a second step of authentication such as Smartphone texting access codes or emails. Users, in addition to having a password, will need a device to navigate the second step before they can go to work.

Apr 03, 2019
Mike Bridges

In the spirit of Tech Tock, I’m going to discuss Cyber Security from a compliance perspective.  This is still about technology and does have a sense of urgency for financial services professional.  The trend I’ve witnessed for the last few years is pushing downward into the supply chain, compliance.  Cyber Security companies believe they have a good handle on defensive, layering, real-time protection and that the problem today is pushing down into the supply chain and continues to close vulnerabilities.


web seal SOC2T2 145

Need Support?
Need Sales?
Back to top