Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
T-Mobile Is The Latest To Get Hit By Data Breach
Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was ...
How To Stay Secure While Working At Home
Companies all over the US are starting to send employees home during the workday (schools are also shutting their doors). The problem? Most organizations have not implemented work from home plans that consider cybersecurity threats introduced in a work from ...
Phone Call And Text Phishing Scams Are On The Rise
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on ...
New Phishing Emails Trick Users With Convincing Security Credentials
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year ...
Facebook Is Fighting Back Against Spam Accounts
Unless you're plugged into the world of social media, you may not realize it. There's a war on, and until recently, it was a war that Facebook was losing. The war is ...
JCrew Retailer Customers May Have Had Information Accessed
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential ...
New Android Malware Can Get Past Two-Factor Authentication
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number ...
Mobile Internet Usage Continues To Rise According To Study
A few years ago, the people who track such things announced that the PC had been dethroned. They said a slight majority of people were turning to their phones as their primary ...
Facial Recognition Company Hacked, Leaking Billions Of Photos
Photos are a new kind of currency, and gaining in value. Clearview AI is a facial recognition startup used by hundreds of law enforcement agencies around the country. The company was hacked, ...
Google Translate Adds More Languages To Assist Communication
Every kid who grew up watching sci-fi has dreamed of the day when a Universal Translator would be available, making seamless communication possible and eliminating the language barrier entirely. That day hasn't ...
Emails Pretending To Be Secret Admirers Could Be Ransomware
Nemty Ransomware isn't an especially well-known threat, but it's dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that's attempting to spread the ransomware far and ...
New Edge Browser Coming To Windows 10 Through Updates
Microsoft Edge has been changed and improved many times. It is now Chromium-based, and is one important step closer to widespread release. At present, the new browser is available to Windows 10 ...


