Resources
Why Cybersecurity Spending Fails Without a Clear View of Your Cyber Liability

Most organizations invest in cybersecurity because they feel they have to. Threats are increasing, insurance requirements are tightening, and customers, regulators, and partners expect some level of protection. Doing nothing no longer feels like an option. So companies spend money. They buy tools, ...
Cyber Trends
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
More Articles
Nintendo Switch User Information Breach Affected Over 300,000 Users
A couple of months ago, Nintendo announced that their Switch gaming and live streaming service had been hacked, and as a result, some 160,000 user accounts had been compromised. As the company ...
Update Windows 10 Immediately If You Haven’t Updated Since March
When was the last time you applied a Windows 10 security patch? If you haven't patched since March 10th, it would be an excellent idea to do so as quickly as possible. ...
5 Steps To Choose The Right Cyber Insurance Policy
Leaders of MSPs have been asking me: what are the gotchas when it comes to cyber insurance. With more focused attacks on clients now—especially with transitional periods to and from ...
New Chromium Based Edge Browser Update From Windows 10
Microsoft has been talking for months about their new Edge browser based on Chromium technology. Users will finally be able to see it in action as of the KB4559309 Windows 10 update, ...
This New Malware Is Hitting Exchange Servers To Steal Info
In late 2019, a new strain of malware called "Valak" was detected. In the six months that followed its initial discovery in the wild, more than 30 variants of the code were ...
Storage Cleanup Tools In Windows 10 Getting Added Feature
For more than 20 years, "Disk Cleanup" has been a feature in every Windows Build. It's a quick, easy way to free up hard disk space by getting rid of unneeded system ...
Growing Security Threats Targeting MSPs?
Early last month the Department of Homeland Security issued a warning for MSPs: you’re a growing target of cyberattacks. By now, ...
Only 33 Percent Of People Change Password After Data Breach
A new study was published by researchers from the Carnegie Mellon University's Security and Privacy Institute and was presented at the 2020 IEEE Workshop on Technology and Consumer Protection. The study has ...
Password Text Export Feature Coming To Firefox
Mozilla's Firefox browser, like most modern browsers, has a built-in password management feature that allows you to save passwords for sites you log into on a regular basis. Since the browser stores ...
A List Of Devices That Will Support The iOS 14 Update
By the time you read these words, Apple will likely be previewing iOS 14 and iPadOS 14 at the all-virtual WWDC 2020. While the latest version of Apple's OS will no doubt ...
Major Security Flaw Found In Some Cisco Routers
Recently, Cisco disclosed the existence of four serious security flaws in their routers that use iOS and iOS XE software. One of the four, CVE-2020-3227 is rated at a severity of 9.8 ...
Are You Setting The Right Security Goals?
When I talk with many IT professionals—including CEOs, CIOs and leadership in IT departments—I often hear the same responses when asking them whether ...


