RESEARCH
From Furrows to Firewalls: Why Your Farm Is the Hacker’s New Playground

When I was a kid, you spent hours plowing a field. Back and forth. Back and forth. You lined the front tire of the tractor perfectly with the last furrow. The sun baked your neck. Dust clogged your nose. Your ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
BazarBackdoor Uses Compressed Files To Deliver Malware
Security researchers have spotted a new phishing campaign in the wild that you'll want to make a note of. In this case the hackers are attempting to deliver a malware strain known ...
Morgan Stanley Banking Latest To Get Hit By Data Breach
Hacks continue to evolve as the hackers themselves get increasingly sophisticated. One of the most recent victims is investment banking giant Morgan Stanley. Their network was breached after the attackers stole personal ...
Microsoft Issues Patches For PrintNightmare Bug
If you're one of the legions of Windows users, you may be aware that the OS currently has some printer issues. In fact, they're so severe that the bug has been dubbed ...
Ransomware Attackers May Target Industrial Machines Soon
Government officials and some internet security researchers have been saying for quite some time now that the nation's (and the world's) core infrastructure is at risk. Some examples include the flow of ...
Does Your Team Appreciate CVEs?
There seem to be so many vulnerabilities out in cyber space right now that everyone is hearing about at least a couple of them. ...
Google Calendar Adds Virtual Meeting For Hybrid Office Workers
The pandemic is slowly fading from the headlines and releasing its grip on the world as the dominant factor in daily life. Now, businesses of all shapes and sizes are beginning to ...
Fake Apps Stealing Info With Current Cryptocurrency Boom
In case you haven't been paying attention, the Cryptocurrency markets have been booming in recent months. All of the major currencies have now pulled back from their all time highs, but BitCoin ...
Chromebooks Get First Optimized Browser Alternative
In the world of internet browsers, most people only think of the Big Three: Chrome, Safari, and Microsoft Edge. Occasionally, Firefox gets an honorable mention, but there are a whole raft of ...
This Malware Could Be Using Your PC To Make Money
If you haven't heard of a malware strain called Crackonosh, be aware that it might be abusing your system, and specifically, Windows Safe Mode, to make money for its controllers. In fact, ...
Some Netgear Devices May Have Vulnerabilities According To Microsoft
Do you use a Netgear DGN router, either at home or in your office? If so, be aware that Microsoft has discovered a number of security flaws that impact those devices, if ...
Some US Mercedes Customers Likely Hit With Data Breach
Do you own, or have you recently test-driven a Mercedes? If so, or if you've created an account on their website for some other purpose, be advised that the company recently disclosed ...
Focus Your Cybersecurity Problem Towards Culture
I’m sure you’ve seen it. Business owners that will sign on the dotted line just to get more security in place. They come to ...