RESEARCH
From Furrows to Firewalls: Why Your Farm Is the Hacker’s New Playground

When I was a kid, you spent hours plowing a field. Back and forth. Back and forth. You lined the front tire of the tractor perfectly with the last furrow. The sun baked your neck. Dust clogged your nose. Your ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
Social Engineering The Help Desk
Why Help Desks are becoming a big target for social engineering and what you can do about it. Help desk. What is the help ...
Windows Turned On Default Blocking For Potentially Unwanted Apps
Microsoft made a small but significant change to Windows 10 recently as it relates to PUAs (Potentially Unwanted Apps). It wasn't something that got a lot of press but it's a change ...
Google May Phase Out Secure Lock Icon For Websites
Google has had a long history of taking steps to make the web more secure for everyone. One of their early moves involved warning users via popup box when they surfed their ...
This Malware Can Take Control Of Facebook Accounts
Do you have a Facebook account? Even if it has been a while since you last logged on there is a new threat you should be aware of. A new strain of ...
Hackers Are Pretending To be Chipotle In Poisoned Emails
Hackers Are Pretending To be Chipotle In Poisoned Emails Chipotle recently reported that an account used by their company's marketing department had been hacked. A currently active campaign is underway leveraging this ...
New Mac Device Malware Is Bypassing Apple Security
Apple is generally very good about providing its users with a safe and secure computing environment. For many years the company was able to rightly claim that Microsoft had a far worse ...
Microsoft Teams Fend Off Phishing Attacks With Link Protection
Microsoft Defender has long included "Safe Links" protection as part of its overall function. The company recently announced that it would be extending Safe Link functionality so that it provides protection from ...
Improve Your Security By Taking The Offense
Last week was a whirlwind of cybersecurity. Outside the routine investigations into updates to the VSS, PrintNighmare, or M365 phishing events (all indicative of ...
Latest Security Update For Apple Devices Is Critical
Do you have an Apple device? If so then you should be aware that the company recently issued an OS update that includes Macs, iPads, and iPhones. You'll want to update to ...
Google Improving Security And Transparency For Android Apps
Google recently announced some additional details relating to their "Safety Section" feature of the Google Play store. This is part of an ongoing effort to make the Play Store a safer and ...
Your Kindle EBook May Lose Partial Functionality Soon
Do you own an older Amazon Kindle? Older Kindles utilize 3G internet connectivity protocols but mobile carriers are currently racing to upgrade their networks to 4G/5G. Older devices that only have a ...
Malware Named Xloader Targeting Macs And Stealing Information
XLoader is a newly discovered strain of malware designed to infect systems running macOS. This new strain was built from a malware strain called FormBook which was designed to steal passwords from ...