RESEARCH
The “Free AI Tool” That Just Invited Hackers Into Your Business

Picture this: It’s Tuesday afternoon. Sharon from accounting is drowning in spreadsheets. She Googles: “Best free AI tool to make Excel easier.” She finds one. It promises magic. She clicks. She downloads. And just like that, hackers just scored VIP ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
Your Employees Could Be Putting Your Business at Risk Without Knowing It. Here’s How to Stop It.

You have good people. They work hard and want to do the right thing. But when it comes to cybersecurity, even a small mistake can bring your whole business to a stop. An employee clicks on a fake email. Another ...
More Articles
Wishbone App Database Leaked To Public By Hacker
The hacking group calling themselves 'The Shiny Hunters' has been busy. Recently, they put databases containing user records from eleven different companies up for sale on the Dark Web, including a massive ...
New Data Breach Affected Some Bank Of America Loan Applicants
If you're like many business owners, you may have recently applied for a loan through the Paycheck Protection Program (PPP) which was one of the COVID-19 relief funds established by the Federal ...
Microsoft Phasing Out 32Bit Windows 10 Support Starting With OEMs
Be advised that Microsoft has announced it will begin phasing out support of the 32-bit version of Windows 10, beginning with OEM's. The change is effective as of the May 2020 release. ...
Home Chef Company Data Breach Affected 8 Million Customers
Are you a Home Chef customer? If so, be advised that the company recently announced a data breach. It was discovered after the hackers who broke in sold more than 8 million ...
Is Your Firewall Working As Expected?
Are we building fortresses with back doors? I keep hearing IT teams talk about cybersecurity as the fortress protecting your data. And one of the most important part? The firewall as its ...
iPhone Update Includes COVID-19 Contact Tracing And Mask Detection
The latest release of iOS and iPadOS (13.5) is out, and contains the usual variety of bug fixes and modest improvements. In addition to the usual fare though, it also makes an ...
New Chrome Feature Stops Ads That Use Excessive Resources
Recently, Google announced a change that should be a welcome relief to many users, especially those who surf primarily on laptops or handhelds. Beginning in late August, the browser will automatically unload ...
Update WordPress Pagebuilder Plugin To Avoid Potential Hack
Do you use SiteOrigin's Pagebuilder plugin for WordPress? If so, you've got plenty of company. The intuitive, widget-based plugin has been installed more than a million times and is used by webmasters ...
Bandwidth Limits For Updates Coming To Windows 10 Soon
Some Windows 10 updates are big. Most of them range in size from 200-500MB, but some are even larger. This month's, for example (May 2020), is more than 2GB in size, which ...
Preview Now Available For Microsoft’s New Family Safety App
Family safety features have been a part of the Windows 10 experience since its release, and those tools were made available on the Xbox in tandem with the release of Windows 10. ...
Hackers Are Demanding Extra Ransomware Payments From Victims
Hackers who use ransomware to conduct their attacks have a new trick up their sleeves. A ransomware family has begun employing the tactic of not only demanding payment to unlock infected systems, ...
Is Your Cybersecurity Stack Hurting You
Why your tech stack is out of control and 3 things you can do right now to fix it. As a leader, you realize that no problem has one solution. Security problems ...