RESEARCH
Your Guide to Implementing CMMC: What Defense Contractors Must Know Now

Introduction Beginning November 10, 2025, the Department of War (née Department of Defense) will formally require that new solicitations and contracts include compliance with the Cybersecurity Maturity Model Certification (CMMC). For firms in the defense industrial base, that means compliance ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
Has Your Bandwidth Slowed Down? It Could Be Proxyware
There's a lot of money to be made by selling things that don't belong to you. That's a lesson hackers around the world have learned very well. Their latest venture is selling ...
Exchange Servers Are The Target Of This New Ransomware
A new ransomware gang known as "LockFile" has recently burst onto the scene. They specifically target Microsoft Exchange servers to gain access then proceed to encrypt everything they can find. LockFile employs ...
WhatsApp Mods On Android Devices May Contain Malware
Are you a WhatsApp user? If you are you may have heard of the FMWhatsApp mod. It promises to improve the WhatsApp user experience by improving user privacy, giving access to custom ...
Recent Android App Update Caused Calling And Answering Issues
Google's Android app is the most installed app of all time with more than 5 billion installations. That matters because recently the company reported the existence of a serious bug in the ...
Penetration Test Vs Vulnerability Assessment?
As I meet speak with a growing number of MSPs, one thing is clear. Many are investing thousands of dollars in penetration tests that ...
Popular Gaming Company Has An Installation Software Server Vulnerability
You may not be familiar with the name "SteelSeries" unless you're a gamer. The company makes an exceptional line of gaming gear including keyboards, mice, and gaming headsets. If you buy one ...
Windows Server 2022 Has Been Released
Some products are released with lots of fanfare. Others with very little. There was almost no fanfare behind the release of Windows Server 2022 but it is currently available to customers. Windows ...
These Small Business Cisco Routers Should Be Replaced
Do you own any of the following Cisco UPnP (Universal Plug and Play) routers? RV110W RV130 RV130W Or RV215W If you do then you will want to replace your gear as quickly ...
Recent Massive Data Breach Attacks T-Mobile Company
US telecommunications giant T-Mobile is the latest big company to suffer from a successful hacking attack. The company is still cooperating with law enforcement and investigating an attack. Here are the details. ...
Windows 11 Makes It Harder To Switch From Edge Browser
Analysts who have been following the development of Windows 11 generally have good things to say about the redesign of the interface. There is one aspect of the new OS that's been ...
Microsoft Paint Gets New Look In Windows 11
MS Paint has had a long and interesting history. It is one of the oldest apps bundled with Windows and has been present for literally decades. Microsoft made plans to retire Paint ...
Three Security Concerns For Onboarding New Clients
What might not have been that important a couple of years ago or even a year ago might be on top of mind today. ...