RESEARCH
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
More Articles
Support For Many Microsoft Apps Will Stop In 2020
The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous amount of change. If you're an IT manager, be aware ...
ISO Files Are Being Used To Deliver Malware
Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their ...
Message Recall Feature May Be Added To Office 365
For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows them to recall messages that have been sent using Outlook, ...
Kids Can Bypass Communication Limit Feature On iOS 13.3
If you have children that own Apple devices, be aware that the latest update for iOS 13.3 included a feature called Communications Limits. It is designed to allow parents to set up ...
Windows 10 Update Caused Issues With File Explorer
Have you already installed Windows 10, build 1909? If so, then you've probably noticed that the latest build update introduced a few bugs to Windows File Explorer. After installing the latest build, ...
Citrix Applications Need Patch To Address Vulnerability
Researchers at Positive Technologies recently discovered a serious vulnerability in Citrix Enterprise products that threatens the security of more than 80,000 companies in 158 countries around the world. The issue is being ...
FBI Sheds New Light On Ransomware Tactics
According to a recent FBI alert marked "TLP: AMBER," businesses should be on high alert for ransomware attacks. The alert reads, in part, as follows: "Since January 2019, LockerGoga ransomware has targeted ...
Data Breaches Continue With Three New High Profile Cases
As 2019 draws to a close, we can say definitively that the year has been another record-breaking one where data breaches are concerned. Hackers around the world have been busy in recent ...
Cashless Shopping Could Get Easier In the Future
For decades, futurists have been promising a cashless society and all the convenience that comes with it. So far though, the technology we have available hasn't lived up to the promise. Sure, ...
Apply Security Update To Protect Against Nvidia Vulnerability
Have you downloaded the NVIDIA GeForce Experience (GFE) app? It's a helper app designed to work in tandem with GeForce GTX graphics cards. It is designed to automate the process of keeping ...
The End Of Windows 7 Support Is Almost Here
Do you still have a few machines in your company that are running Windows 7? If so, be aware that Microsoft is formally ending Windows 7 support in a matter of weeks. ...
New Orleans Shuts Down After Ransomware Attack
Things aren't so easy in the Big Easy right now. The city of New Orleans has suffered a ransomware attack. As a result, most of the city's servers and computers are currently ...


