Resources
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Cyber Trends
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
The New Spiderman Is Coming for Your Business

And He Does Not Care How Good Your Antivirus Is Picture this. You’re sitting at your desk, coffee in hand, feeling pretty good about the day. Revenue looks solid. Your team is productive. IT hasn’t bothered you in weeks, which you assume means everything is fine. Then ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Update Windows 10 Immediately If You Haven’t Updated Since March
When was the last time you applied a Windows 10 security patch? If you haven't patched since March 10th, it would be an excellent idea to do so as quickly as possible. ...
5 Steps To Choose The Right Cyber Insurance Policy
Leaders of MSPs have been asking me: what are the gotchas when it comes to cyber insurance. With more focused attacks on clients now—especially with transitional periods to and from ...
New Chromium Based Edge Browser Update From Windows 10
Microsoft has been talking for months about their new Edge browser based on Chromium technology. Users will finally be able to see it in action as of the KB4559309 Windows 10 update, ...
This New Malware Is Hitting Exchange Servers To Steal Info
In late 2019, a new strain of malware called "Valak" was detected. In the six months that followed its initial discovery in the wild, more than 30 variants of the code were ...
Storage Cleanup Tools In Windows 10 Getting Added Feature
For more than 20 years, "Disk Cleanup" has been a feature in every Windows Build. It's a quick, easy way to free up hard disk space by getting rid of unneeded system ...
Growing Security Threats Targeting MSPs?
Early last month the Department of Homeland Security issued a warning for MSPs: you’re a growing target of cyberattacks. By now, ...
Only 33 Percent Of People Change Password After Data Breach
A new study was published by researchers from the Carnegie Mellon University's Security and Privacy Institute and was presented at the 2020 IEEE Workshop on Technology and Consumer Protection. The study has ...
Password Text Export Feature Coming To Firefox
Mozilla's Firefox browser, like most modern browsers, has a built-in password management feature that allows you to save passwords for sites you log into on a regular basis. Since the browser stores ...
A List Of Devices That Will Support The iOS 14 Update
By the time you read these words, Apple will likely be previewing iOS 14 and iPadOS 14 at the all-virtual WWDC 2020. While the latest version of Apple's OS will no doubt ...
Major Security Flaw Found In Some Cisco Routers
Recently, Cisco disclosed the existence of four serious security flaws in their routers that use iOS and iOS XE software. One of the four, CVE-2020-3227 is rated at a severity of 9.8 ...
Are You Setting The Right Security Goals?
When I talk with many IT professionals—including CEOs, CIOs and leadership in IT departments—I often hear the same responses when asking them whether ...
Lawsuit Claims Google Private Browsing Isn’t Really Private
Google is in hot water with a complaint filed to the District Court of Northern California. The complaint alleges that the tech giant tracks users' browsing data and a variety of other ...


