Resources
Agentic AI Is Acting on Your Behalf. The Law Assumes You Meant It To.

When AI Makes Decisions, Your Organization Owns the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes an ...
Cyber Trends
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
The New Spiderman Is Coming for Your Business

And He Does Not Care How Good Your Antivirus Is Picture this. You’re sitting at your desk, coffee in hand, feeling pretty good about the day. Revenue looks solid. Your team is productive. IT hasn’t bothered you in weeks, which you assume means everything is fine. Then ...
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Tweets Can No Longer Be Sent From SMS To Twitter
If you use Twitter on a regular basis, then you probably saw the official tweet from the company. Effective immediately, they've shut down the functionality that allowed users to tweet via SMS, ...
Microsoft Edge Update Will Benefit Security And Remote Workers
Microsoft is working hard to improve its Edge browser, and the latest beta build (Dev version 84.0.495.2) has a lot to be excited about. Most of the benefits are aimed at security ...
How Documentation Will Save Your Cybersecurity Program
Ten years ago, when I was the owner and CEO of a managed services provider business up in Ann Arbor, MI, my team was struggling to use effective documentation. We had a ...
SBA And CDC Phishing Emails Can Carry Malware
According to Microsoft, its machine learning threat detection models have helped its research teams uncover multiple mal-spam campaigns. These campaigns have been tied together by the common theme of incorporating poisoned disk ...
PC Users Beware Of Downloader For Zoom Created By Hackers
Are you working from home right now? If so, you're certainly not alone. Tens of millions of people are doing the same, and there are untold millions around the world doing likewise. ...
Illegal Movie Downloads Can Give Your Device Malware
If you're like a lot of people stuck at home during the pandemic, you probably ran out of Netflix titles to watch a couple of weeks ago. As a result, researchers have ...
WiFi 6e Should Be A Big Improvement To Crowded Wifi Spaces
If you're like a lot of people, right now, you're doing what work you can from home. If that's the case, you've probably noticed that your home WiFi network is struggling. The ...
Payment Protection And Stimulus Programs Are Being Used By Scammers
Just about everyone in the country has been negatively impacted by the pandemic. That is why the government is sending relief via the Payment Protection Program, the stimulus program, and other programs. ...
Microsoft’s Edge Browser To Release New Features
Microsoft recently re-reinvented its web browser. After finally giving up on bug-plagued Internet Explorer, the company introduced Microsoft Edge, which it hoped would take the internet community by storm. When that didn't ...
Is Your Cloud Infrastructure Safe From Hackers?
Do you support ancillary cloud services? Last week when I was helping an MSP recover from a cloud server account shut down. This was a client that was NOT using their standard ...
Google Is Adding Verification Policy For Online Ads
Recently, Google announced they were making some important changes to their rules governing online ads. They're adding verifications that they normally reserve for political advertisements,. This step is in a bid to ...
Microsoft Stopped Hackers Using GIFs To Access User Data
Microsoft Teams (which is the company's Enterprise chat app) isn't all business. Like most other chat apps, it allows those who use it to send amusing animated Gif images. Unfortunately, that proved ...


