RESEARCH

Wait… Are You Saying Compliance Is Dead?

Posted by paulmaxwell On
Wait… Are You Saying Compliance Is Dead?

I got a message today that made me spit out my coffee. It started like this: “From the recent Tuesday webinars, it seems Galactic is moving away from providing compliance as a service…” Hold on. Nope. Not even close. Let ...

Cyber Trends

Business Resilience

Security Best Practices

More Articles

The Least Engaged Person on Your Team Is Your Biggest Security Risk

Last week, I flew 81 Galacticos into Nashville. It was our offsite—a day to plan, get sharp, and punch some holes in our own assumptions.  We do something at these events called Galactic Shark Tank. It’s exactly what it sounds ...

What AI’s Really Doing in Your Office (And Why You Should Be Terrified)

Let me ask you something you probably don’t want to answer:  Do you actually know what your team is doing with AI?  Not what they say they’re doing.  Not what you hope they’re doing.  What they’re really doing—with your company’s ...

What Your Last IT Project Really Cost You

You did the thing every business does: You launched an IT project. Maybe it was a migration. Maybe a new app rollout. Maybe you just “upgraded some systems.” Great. You made the investment. You expected ROI.  But here’s the question ...

How Will You Respond When the Letter Shows Up?

Let’s say a breach hits your company. The bad kind. Ransomware, data theft, media buzz—the full circus. Do you have a plan? I’m not talking about the “we have antivirus” plan. I mean playbooks. Protocols. A real, documented incident response ...

Even Cartier Can’t Keep the Hackers Out. What Chance Do You Think You Have?

Cartier just got hit. So did The North Face. Not exactly fly-by-night operations. These are brands with billion-dollar reputations—and hackers still got in. Customer data stolen. Systems compromised. Public announcements trying to minimize the damage. The usual script. And it’s ...

Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11.  That’s the good news.  The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos.  Right now, people are calling Microsoft’s ...

You Just Lost Your Phone. Now What?

Let’s be honest. You probably don’t lose things. You don’t misplace your keys. You don’t forget where you parked. And your phone? It’s probably surgically attached to your hand. But here’s the thing—phones get lost. Phones get stolen. And if ...

The Shocking Truth About Your Macs

Let me tell you a story we didn’t expect to write. We’ve been hammering away in our lab, diving deep into the Apple ecosystem—testing, poking, simulating real-world attacks. You know what we found? macOS is tight. The security architecture? Rock ...

The IRS Test: Why Your Cyber Program Needs More Than Just Good Intentions

Think about your cybersecurity the same way you’d think about your books. Everyone says they “take security seriously.” But when the auditors show up—or worse, the breach happens—intentions don’t matter. Proof does. Here’s how I break it down for MSPs ...

When the Fire Hits, You Better Have a Map

You lock your office. You set the alarm. Maybe you even have a camera watching the front door. You’re not careless—you take reasonable steps to protect your business. But here’s the part no one tells you: when the fire starts—when ...

Victoria’s Secret Just Pulled the Plug on Its Website. Here’s Why That Should Worry You.

Last week, Victoria’s Secret—the billion-dollar lingerie brand—shut down its U.S. website and paused some store services. They called it a “security incident.” No one knows yet what happened behind the scenes, but one thing is clear: it was serious enough ...

How a Waiver (Yes, Like Skydiving) Could Protect Your Business in Court

You wouldn’t go skydiving without signing a waiver.  Why? Because when something goes wrong mid-air, you don’t want to debate liability on the way down.  Here’s the problem: most businesses are making high-risk IT decisions without any form of documentation. ...