RESEARCH
Why Rushing Compliance Could Be the Most Expensive Mistake Your Business Ever Makes

Imagine someone telling you they could build out your entire HIPAA compliance program in under three days. That’s not a typo. Three days. No heavy lifting required on your part. Sounds almost ...
Cyber Trends
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Your Data Was Stolen. And No One Noticed.

The ransomware headlines are dying down. And that’s exactly why you should be worried. Because while you’ve been breathing a little easier, thinking the cyber threats are fading… the game has already changed. And the attackers? They’re getting smarter, quieter, ...
Business Resilience
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
What Your Last IT Project Really Cost You

You did the thing every business does: You launched an IT project. Maybe it was a migration. Maybe a new app rollout. Maybe you just “upgraded some systems.” Great. You made the investment. You expected ROI. But here’s the question ...
You Just Lost Your Phone. Now What?

Let’s be honest. You probably don’t lose things. You don’t misplace your keys. You don’t forget where you parked. And your phone? It’s probably surgically attached to your hand. But here’s the thing—phones get lost. Phones get stolen. And if ...
Security Best Practices
Wait… Are You Saying Compliance Is Dead?

I got a message today that made me spit out my coffee. It started like this: “From the recent Tuesday webinars, it seems Galactic is moving away from providing compliance as a service…” Hold on. Nope. Not even close. Let ...
The Least Engaged Person on Your Team Is Your Biggest Security Risk

Last week, I flew 81 Galacticos into Nashville. It was our offsite—a day to plan, get sharp, and punch some holes in our own assumptions. We do something at these events called Galactic Shark Tank. It’s exactly what it sounds ...
Your Gate Is Locked. But Is It Doing Anything?

Last week, I had a conversation with a CEO who just crossed a billion dollars in revenue. Yes, billion with a “B.” Big milestone. Big operations. Big targets. So why was he on the phone with me? Because his security ...
More Articles
Google Fixed The White Screen Issue On Chrome
Google recently found itself in hot water with corporate IT administrators for rolling out a feature designed to help prolong battery life. The new feature accomplished its mission, but it had an ...
Android Devices Using Qualcomm Chips Can Be Hacked
Do you have an Android device? Is it built around a Qualcomm chipset? If so, be advised that you may be at risk. According to a report recently published by security firm ...
Public Chargers Can Expose Your Device To Hacking And Malware
On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give ...
Hackers Are Imitating Government Agencies To Spread Malware
Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...
Another WhatsApp Vulnerability Has Been Found
WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...
Windows Bug Found To Cause Slow Startup
Microsoft recently published an important new support document relating to several Windows versions. The document reads, in part, as follows: "After you configure a Windows-based computer to use ...
Fake Voicemail Messages Tricking People Into Opening Malicious Content
Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to ...
Racoon Stealer Malware Is New One To Watch For
There is a new form of malware that you and your staff need to be aware of. That's because it's gaining in popularity among cyber criminals around the world. Known as 'Racoon ...
Popular Web Domain Registrar Hit With Data Breach
Do you have web domains registered with Web.com, Network Solutions or Register.com? If so, at least some of your data may have been compromised. Web.com recently reported that they and their two ...
Non-Updated Android Phones Vulnerable To NFC Beaming Hacks
Has it been more than a month since you upgraded your Android OS? If so, you should make upgrading a priority. Just over a month ago, Google patched a critical flaw in ...