Resources
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
More Articles
Ransomware Targets Company Working On A COVID-19 Vaccine
It's common knowledge that hackers are highly opportunistic and certainly not above targeting children, the sick and the dying if there's money to be made. Even so, attacking a drug company currently ...
Over Half Of All Calls People Receive Are Spam Calls
If you're like most people, you probably get a lot of calls over the course of a week. They're probably calls that you'd just rather not get at all. How many of ...
Zoom Is Working On Security But May Be Too Late
The popular messaging tool called Zoom is having a tough time. According to a recently released memo that circulated through Elon Musk's "SpaceX" company, the company is banning Zoom's use because of ...
Private Twitter Files May Have Been Cached In Firefox
Are you a regular Twitter user? More specifically, are you a regular Twitter user who also prefers the Firefox web browser? If so, be advised that Twitter recently disclosed a new bug ...
Over 5 Million Marriott Customers Vulnerable In Latest Data Breach
Are you a frequent guest at Marriott hotels? If so, be advised that the company has recently reported a massive data breach that could impact up to 5.2 million guests who have ...
Should You Put Your Cybersecurity To The Test?
You’re probably familiar with the concept of “trust but verify”. When it comes to security you do this all the time. Maybe you don’t test the limits of a lot of things ...
Huge Increase In Phishing And Malware Attacks Using Coronavirus
Around the world, hundreds of millions of people are terrified of the current pandemic that's raging. Most of those are currently self-quarantining at home and limiting their social contacts. Everyone is hungry ...
Google Data Shows Impacts Of Covid-19 Shelter In Place Precaution
Google is using the massive footprint in the smartphone ecosystem to help people understand the impacts that social distancing is having in the face of the global pandemic. Their new global Community ...
Crowded WiFi Networks Could Get Better Pending FCC Vote
Wireless connectivity is becoming a victim of its own success. Every year, the appetite for bandwidth grows, but of course, there's only so much to go around. The recent shelter in place ...
Office 365 Making Changes To Accommodate Millions Working From Home
Recently, Netflix announced that it was scaling back its streaming speeds to better handle the increased load brought on by millions of people around the world sitting at home due to the ...
Some HP Devices May Fail After 30,000 Hours Of Use
Late last year, Hewlett Packard Enterprise (HPE) issued a warning about some of the Solid State Drives they manufacture. The warning was that unless users downloaded a patch to the drive's firmware, ...
iOS Update Includes iPhone And iPad Features And Fixes
If you don't normally prioritize updating your iPhone and iPad OS, you're probably going to want to shift gears and grab version 13.4 as soon as possible. The latest versions of both ...


