Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Latest iOS Update Brings Several Important Bug Fixes
Not long ago, security researcher Brian Krebs discovered an issue with the iPhone 11. It contains a chip dubbed U1, which functions on UWB (Ultra Wide Band). Due to international regulatory requirements, ...
Wawa Data Breach Includes Information On 30 Million Customers
Another week, another high-profile data breach. This time, it's a big one. In December 2019, the convenience store chain Wawa disclosed that they had discovered malware on their point of sale system ...
Shlayer Malware Continues To Attack Mac Systems
If you're a Mac user, you may have heard of the malware known as Shlayer. It first made headlines in the early part of 2018. The malware is primarily used to install ...
Microsoft Chromium Edge Will Get Internet Explorer Mode
As you may have heard, Microsoft is getting out of the browser game. Recently, the company announced that they were redesigning their Edge browser, which never quite caught on. Rather than trying ...
Data Breach Hits Microsoft Customer Service Database
Over the last twelve months, we've heard reports from companies of all shapes and sizes that have suffered from data breaches. Many of them were caused by an act of carelessness on ...
Active DirectoryBeing Targeted By Malware Called TrickBot
The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the ...
New IRS Tax Scammers Use Personal Data For Big Returns
Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns ...
New Ransomware Leaks Confidential Data To Public
There's a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won't pay, their data that was stolen and ...
Microsoft Releasing New Chromium Based Edge Browser To Users
Microsoft Edge is dead. Long, live Microsoft Edge! The tech giant Microsoft has seen enormous success in a variety of markets, but it never could make a dent in Google's dominance in ...
Messaging Gets Upgrade For Instagram Users
Mark Zuckerberg's social media empire is chasing growth. It's not hard to understand why. Facebook is the world's largest social media platform, with more than 2.4 billion users worldwide. The bigger you ...
New Malware Sends Offensive Texts From Your Phone
Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a ...
iPhone Now Works As A Security Key For Google
Google continues to improve security and its user experience in the Apple ecosystem. The most recent update to the company's Smart Lock app on iOS allows users to use their iPhone as ...


