Resources
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
Cyber Trends
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
More Articles
Shlayer Malware Continues To Attack Mac Systems
If you're a Mac user, you may have heard of the malware known as Shlayer. It first made headlines in the early part of 2018. The malware is primarily used to install ...
Microsoft Chromium Edge Will Get Internet Explorer Mode
As you may have heard, Microsoft is getting out of the browser game. Recently, the company announced that they were redesigning their Edge browser, which never quite caught on. Rather than trying ...
Data Breach Hits Microsoft Customer Service Database
Over the last twelve months, we've heard reports from companies of all shapes and sizes that have suffered from data breaches. Many of them were caused by an act of carelessness on ...
Active DirectoryBeing Targeted By Malware Called TrickBot
The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the ...
New IRS Tax Scammers Use Personal Data For Big Returns
Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns ...
New Ransomware Leaks Confidential Data To Public
There's a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won't pay, their data that was stolen and ...
Microsoft Releasing New Chromium Based Edge Browser To Users
Microsoft Edge is dead. Long, live Microsoft Edge! The tech giant Microsoft has seen enormous success in a variety of markets, but it never could make a dent in Google's dominance in ...
Messaging Gets Upgrade For Instagram Users
Mark Zuckerberg's social media empire is chasing growth. It's not hard to understand why. Facebook is the world's largest social media platform, with more than 2.4 billion users worldwide. The bigger you ...
New Malware Sends Offensive Texts From Your Phone
Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a ...
iPhone Now Works As A Security Key For Google
Google continues to improve security and its user experience in the Apple ecosystem. The most recent update to the company's Smart Lock app on iOS allows users to use their iPhone as ...
Windows 7 Has Reached The End Of Support
Microsoft would like you to know that Windows 7 has reached the end of the road. No more security updates are coming, and there are no more patches or bug fixes. So ...
Wyze User Information Leaked Include Emails And Other Data
Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root ...


