RESEARCH
How Will You Respond When the Letter Shows Up?

Let’s say a breach hits your company. The bad kind. Ransomware, data theft, media buzz—the full circus. Do you have a plan? I’m not talking about the “we have antivirus” plan. I mean playbooks. Protocols. A real, documented incident response ...
Cyber Trends
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Your Data Was Stolen. And No One Noticed.

The ransomware headlines are dying down. And that’s exactly why you should be worried. Because while you’ve been breathing a little easier, thinking the cyber threats are fading… the game has already changed. And the attackers? They’re getting smarter, quieter, ...
Business Resilience
You Just Lost Your Phone. Now What?

Let’s be honest. You probably don’t lose things. You don’t misplace your keys. You don’t forget where you parked. And your phone? It’s probably surgically attached to your hand. But here’s the thing—phones get lost. Phones get stolen. And if ...
You Can’t Scale If You Can’t Name the Dragon

I was having dinner the other night with a CEO of a $2 million MSP. He was excited. Like, jittery-excited. We hadn’t even ordered drinks before he started laying out all the “amazing things” his company had going on. New ...
The One Lie That’s Killing Your Business (and the Seat It’s Sitting In)

I had breakfast with Jim Collins the other day. Okay—he was on stage. I was in the crowd of 400 CEOs, frantically taking notes while inhaling burnt coffee and half-warm Styrofoam eggs. But I was there. I heard him speak ...
Security Best Practices
Your Gate Is Locked. But Is It Doing Anything?

Last week, I had a conversation with a CEO who just crossed a billion dollars in revenue. Yes, billion with a “B.” Big milestone. Big operations. Big targets. So why was he on the phone with me? Because his security ...
Change Your Password? No. Change Your Strategy Before It’s Too Late

Let me guess—you’ve been meaning to change your password. Great. But here’s the problem: if that’s your whole plan, you’ve already lost the game. We’ve seen inside the networks of companies just like yours. We’ve watched how your team behaves ...
If Your IT Support Sucks at the Basics, What’s Happening Behind the Curtain?

Let’s start with a simple truth: it shouldn’t take eight tries to fix your email. If it does? You’ve got a problem. And it’s not just a “my computer is slow” kind of problem. It’s a “how many holes are ...
More Articles
Hackers Are Imitating Government Agencies To Spread Malware
Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...
Another WhatsApp Vulnerability Has Been Found
WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...
Windows Bug Found To Cause Slow Startup
Microsoft recently published an important new support document relating to several Windows versions. The document reads, in part, as follows: "After you configure a Windows-based computer to use ...
Fake Voicemail Messages Tricking People Into Opening Malicious Content
Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to ...
Racoon Stealer Malware Is New One To Watch For
There is a new form of malware that you and your staff need to be aware of. That's because it's gaining in popularity among cyber criminals around the world. Known as 'Racoon ...
Popular Web Domain Registrar Hit With Data Breach
Do you have web domains registered with Web.com, Network Solutions or Register.com? If so, at least some of your data may have been compromised. Web.com recently reported that they and their two ...
Non-Updated Android Phones Vulnerable To NFC Beaming Hacks
Has it been more than a month since you upgraded your Android OS? If so, you should make upgrading a priority. Just over a month ago, Google patched a critical flaw in ...