RESEARCH
Do You Really Want the Cheapest Security Money Can Buy?

Let’s be honest—nobody brags about buying the cheapest parachute. Or hiring the cheapest brain surgeon. Or getting the cheapest babysitter off Craigslist. And yet, when it comes to cybersecurity, business leaders keep searching for the “most affordable” option—like it’s a ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
Your Employees Could Be Putting Your Business at Risk Without Knowing It. Here’s How to Stop It.

You have good people. They work hard and want to do the right thing. But when it comes to cybersecurity, even a small mistake can bring your whole business to a stop. An employee clicks on a fake email. Another ...
More Articles
Is Your Cybersecurity Stack Hurting You
Why your tech stack is out of control and 3 things you can do right now to fix it. As a leader, you realize that no problem has one solution. Security problems ...
Google Added A Video Conferencing Tool For Users
Google Meet is a video conferencing tool the company originally designed for Enterprise users. There are serious security issues with some of the more popular free or low-cost options available for the ...
Facebook’s AI Might Be Able To Find Offensive Memes
Facebook recently released an intriguing research paper called "The Hateful Memes Challenge: Detecting Hate Speech in Multimodal Memes." It's well worth the read and a closer look at the database developed over ...
Xiaomi Phones Track Your Data When Using Their Browser
Do you have a Chinese-made Xiaomi phone? If so, you should be aware that there is a security issue. According to research conducted by Forbes, the Mi Browser that comes built into ...
Emails Saying Your Antivirus Is Expired Are Likely A Scam
A great many companies selling antivirus software have affiliate programs that help them expand their reach. Each time an affiliate sells a copy of the software, they get a cut. It's a ...
Update NinjaForms In WordPress To Avoid Potential Hack
Are you one of the million-plus website owners making use of Ninja Forms for WordPress? If so, be aware that the company has recently patched a serious security flaw that allowed hackers ...
Tweets Can No Longer Be Sent From SMS To Twitter
If you use Twitter on a regular basis, then you probably saw the official tweet from the company. Effective immediately, they've shut down the functionality that allowed users to tweet via SMS, ...
Microsoft Edge Update Will Benefit Security And Remote Workers
Microsoft is working hard to improve its Edge browser, and the latest beta build (Dev version 84.0.495.2) has a lot to be excited about. Most of the benefits are aimed at security ...
How Documentation Will Save Your Cybersecurity Program
Ten years ago, when I was the owner and CEO of a managed services provider business up in Ann Arbor, MI, my team was struggling to use effective documentation. We had a ...
SBA And CDC Phishing Emails Can Carry Malware
According to Microsoft, its machine learning threat detection models have helped its research teams uncover multiple mal-spam campaigns. These campaigns have been tied together by the common theme of incorporating poisoned disk ...
PC Users Beware Of Downloader For Zoom Created By Hackers
Are you working from home right now? If so, you're certainly not alone. Tens of millions of people are doing the same, and there are untold millions around the world doing likewise. ...
Illegal Movie Downloads Can Give Your Device Malware
If you're like a lot of people stuck at home during the pandemic, you probably ran out of Netflix titles to watch a couple of weeks ago. As a result, researchers have ...