Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
New Windows 10 Search Issue May Just Require A Reboot
On February 5th, after the latest Windows 10 update, many users found that they were unable to make use of the search function built into the operating system. The most common result ...
People Are Moving From Windows 7 To Windows 10 For Security
Despite the age of the OS, Windows 7 has enjoyed a surprisingly large and loyal user base. That changed suddenly when Microsoft finally pulled the plug on Windows 7 support. It couldn't ...
Videos In Google Photos Accounts May Have Been Exposed
Security lapses can happen to any company, large or small. No one is immune. Not even Google. Recently, the company began sending out email notifications to some users explaining that a bug ...
Some Smart Light Bulbs Are Vulnerable To Hackers
Hackers will take any and every opportunity presented to them, even if it means hacking smart light bulbs. Recently, security researchers at Check Point discovered a bug in the Philips Hue smart ...
Password Manager Malware Tricks Users Into Revealing Their Passwords
There's a new threat making the rounds called 'Metamorfo' that you should be aware of. The malware began its life as a banking trojan. This news is from researchers at Fortinet, who ...
Financial Organizations Beware Of Documents Asking To Enable Content
If you work in the financial sector, be advised that there's a large scale botnet-driven malware campaign underway. It has been targeting firms in both the US and the UK. The malware ...
New Malware Uses This Year’s Top Movies To Get Clicks
It's easy to get caught up in the hype of popular movies. Hackers know this and are beginning to incorporate Oscar Nominated movies into their strategies. They're using enticing images to bait ...
New Healthcare Breach Blamed On Stolen Laptop
There have been a dizzying number of high-profile data breaches in recent months, and now we have one more to add to the growing list. Health Share of Oregon is a Medicaid ...
Google Search Update Caused Backlash And Will Be Fixed
If you use Google Chrome on a mobile device, you'll notice something any time Google displays a list of sites. Let's say for example, if you perform a search for a keyword ...
Internet Explorer Security Update Causing Some Issues With Printing
On January 17th of this year (2020), Microsoft discovered and disclosed the existence of a zero-day vulnerability. It was present in Internet Explorer versions 9 through 11. Hackers could display specially crafted ...
Google Is Working On A Real Time Translation Service
Just about everyone has made use of Google Translate at one point or another. You find some text on a website written in a language you don't understand, pop over to Google.com ...
One More Update For Windows 7 Will Address Wallpaper Issue
As you're probably aware, Microsoft has officially pulled the plug on Windows 7 support for everyone except those who are paying for the privilege via the company's ESU (Extended Security Updates) policy. ...


