Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Tax Information Theft Is On The Rise This Year
It's tax season, and if you're like many people, you make use of one of the numerous e-file platforms offered by TurboTax, TaxAct, and similar companies. Unfortunately, tax season also presents a ...
The New Microsoft Office App Looks Like A Winner
In November of 2019, Microsoft made an announcement and gave users an early look at a new unified Office app designed specifically for Android and iOS devices. The purpose, of course, was ...
Mobile Flash Storage Getting Faster To Accommodate 5G Rollout
Are you ready for the world of 5G? Even if you are, the available storage you have on your favorite devices may not be as robust as you'd like it to be. ...
Mandatory Two Factor Authentication Coming To Ring Devices
Finally, a smart device manufacturer is taking device security seriously, and that's great news indeed. You may recall reading about a serious issue with Ring security systems recently. The news was that ...
Google Docs Gets Smarter With Smart Compose Feature
Google continues to increase the versatility and usefulness of the G-Suite. This time they are adding the much anticipated Smart Compose feature to Google Docs, and it is now available to all ...
New Dangerous Malware Is Disguising Itself As Fortnite Launcher
LokiBot burst onto the scene in 2015, and has earned a reputation as being a powerful. This fearsome trojan is being distributed in a new way that poses a very real threat ...
Dashlane Password Manager Removed From Google For Privacy Issues
Do you use the Dashlane Chrome web extension to help you manage your passwords? If so, you're not alone. The extension has more than three million users based on download stats. Unfortunately, ...
Old School Virus Called KBOT Is Hitting Networks
There was a day when worms were once common, terrifying threats on the internet. In the early days of the world wide web, there were a number of famous attacks that were ...
Malware And Viruses On Apple/Mac Systems Are On The Rise
For most of Apple's history, the company has been able to cast itself as a safer alternative to Windows-based computers.Hackers tended to focus the bulk of their efforts on Wintel boxes (Windows ...
Windows 10X Will Assist With Folding Screens And Dual Monitors
A lot of people raise a curious eyebrow when they hear the term Windows 10X for the first time. It's a bit of a niche product, but it is interesting. In recent ...
Dangerous New Trojan Can Infect Systems Through Wifi
If you're not already familiar with the Emotet trojan, it deserves a special spot on your radar. It's one of the most dangerous forms of malware in the world today. Their success ...
CoronaVirus Scare Is Being Used By Scammers To Trick People
There is no low that hackers and scammers won't stoop to. The US Federal Trade Commission (FTC) has issued a warning about a worldwide scam in progress relating to fears surrounding the ...


