RESEARCH
The Resume That Ended Everything

Meet Bill. Bill runs ops. He’s been with you eight years. He’s dependable. Gets stuff done. You trust him. Then one Tuesday morning, Bill receives an email from one of your clients. It has a resume in it. They highly ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
Even Big Companies Like Nissan Get Hacked
Even the largest companies in the world can't claim immunity to hacking, data breaches and momentary lapses in judgment. Nissan is a classic case in point. Recently, due to a careless oversight, ...
Adobe Flash Is Done And Flash Content Is Being Blocked
Adobe has finally done it, as promised. For more than a year, the company has been slow-walking their iconic Adobe Flash Player to its eventual doom. As of December 31st, 2020, Adobe ...
This New Malware Has A Unique Email Offer
The Quaverse Remote Access Trojan--affectionately dubbed QRat--has been with us since at least 2015. It's a good piece of malware because it's notoriously difficult to detect and it provides high value information ...
New PayPal Phishing Attempts Are After Your Account Info
Hackers and scammers have hit the ground running in 2021, launching an extensive new phishing campaign that targets the legions of PayPal users around the world. The campaign is being run on ...
Brand New Ransomware Found On The Internet
Hackers around the world didn't waste any time. New Year's celebrations have barely ended, and already, we have our first reports of a new malware strain to help ring in 2021. Dubbed ...
Big Changes Coming To Microsoft Outlook In Coming Years
Microsoft has been moving toward a unified "single version" of Outlook that would offer a seamless user experience across all platforms and devices. Unfortunately, thus far, that objective has remained elusive. In ...
3 Ways You Are Poisoning Co-Managed IT Relationships
Maybe you already are providing security services to co-managed opportunities. Maybe you are thinking about diving into co-managed because it is your blue ocean ...
Hacker Attacks On Healthcare Industry Are On The Rise
In the early days of the pandemic, several major groups of hackers pledged that their activities would not be aimed at institutions that were engaged in vaccine research. There was at least ...
Adobe Flash Has Reached End of Life Status
Is your company's website built around Adobe's aging Flash Player? If so, be aware that you are officially on your own. Flash reached its EOL (End of Life) as of January 1st ...
Weak Passwords Are Making Easy Work For This New Malware
There's a new worm making the rounds on Windows and Linux-based servers that you should be aware of. This nasty bit of code has been spreading rapidly, using simple brute-force methods to ...
Security Incident Exposes Some T-Mobile Customer Data
In 2020, there have been a number of high-profile data breaches, and as we move closer to the end of the year, we have yet another to report. This time, cellular carrier ...
Be Careful Your Home Security Cameras Can Be Hacked
Various hackers around the world have found a new hobby. Recently, there has been a rise in "Swatting Attacks", which have seen hackers take advantage of the notoriously weak or nonexistent security ...