Resources
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Cyber Trends
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
The New Spiderman Is Coming for Your Business

And He Does Not Care How Good Your Antivirus Is Picture this. You’re sitting at your desk, coffee in hand, feeling pretty good about the day. Revenue looks solid. Your team is productive. IT hasn’t bothered you in weeks, which you assume means everything is fine. Then ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Some HP Devices May Fail After 30,000 Hours Of Use
Late last year, Hewlett Packard Enterprise (HPE) issued a warning about some of the Solid State Drives they manufacture. The warning was that unless users downloaded a patch to the drive's firmware, ...
iOS Update Includes iPhone And iPad Features And Fixes
If you don't normally prioritize updating your iPhone and iPad OS, you're probably going to want to shift gears and grab version 13.4 as soon as possible. The latest versions of both ...
Is Zoom Safe For Work?
It’s all over the news. Hackers storming online classrooms, board meetings, yoga classes and even happy hours in search of ‘video-bombing’ or disrupting your next online video conference with mayhem. Over the ...
Employees Working From Home Turn To VPN During COVID
It's no secret that the global pandemic we're all living through has changed a great many things about both work and home life. For one thing, work and home life are often ...
Be On The Lookout As Astaroth Malware Makes A Comeback
Are you familiar with Astaroth? If you're a data security professional, you've probably at least heard the name. The group gained some notoriety last year when it came to light that they ...
Apple Update Blocks Safari Third Party Cookies By Default
In May of 2019, a Google blog post encouraged all web browsers to adopt the approach of blocking third-party cookies by default. Google announced their own plans to do so, outlining a ...
Windows 10 Announces One Billion Active Devices
Windows 10 is on a lot of devices around the world. In part, that's because it's a significantly better and more modern operating system than its predecessors. In addition, it's partly because ...
Computers Might Be Able To Smell In The Near Future
Word has recently leaked out about an interesting project that's ongoing at Intel's research labs. The company has apparently built an algorithm that mirrors the brain's activity to detect and identify smells. ...
COVID19 and HIPAA: What You Need To Know
With consideration to our current healthcare crisis with COVID-19, the Department of Health and Human Services (HHS) updated its guidelines on HIPAA enforcement. With the guideline revision, HHS has modified guidelines to ...
Financial Institution Worker Put User Information At Risk
Noam Rotem, a researcher for vpnMentor, recently made a startling discovery. A database connected to a now defunct app called MCA Wizard was found unsecured on the web. It contained a staggering ...
New Google Translate Feature Rolled Out For Android Users
Google Translate is one of the company's most popular services, and most of the people who use it dream of the day when it's a full blown Universal Translator. While that's obviously ...
Coronavirus Health Notifications Being Used To Carry Malicious Threats
A Pakistani-based hacking group that goes by a variety of names, including "Transparent Tribe," "APT36," "Mythic Leopard" and others has been discovered to be behind a particularly nasty attack recently. Researchers with ...


