Resources
Cyber Incident Response Is a Leadership Problem

Part One: Why Incidents Feel Chaotic Before Anyone Touches a Keyboard When most business owners think about a cyber incident, they picture the middle of it. Screens flashing. Systems down. IT scrambling. Phones ringing. Someone saying, “We’re working on it,” ...
Cyber Trends
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
The New Spiderman Is Coming for Your Business

And He Does Not Care How Good Your Antivirus Is Picture this. You’re sitting at your desk, coffee in hand, feeling pretty good about the day. Revenue looks solid. Your team is productive. IT hasn’t bothered you in weeks, which you assume means everything is fine. Then ...
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Landrys Restaurant Chain Latest Victim Of Credit Card Breach
If you're not familiar with Landry's, you're probably familiar with at least some of the restaurants the company owns. The company recently issued a formal 'Notification of Data Breach' in which they ...
New Hacking Method Looks Like A Locked Computer
Scammers have breathed new life into an old scam. For years, the old 'Law Enforcement Lock' trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works ...
Support For Many Microsoft Apps Will Stop In 2020
The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous amount of change. If you're an IT manager, be aware ...
ISO Files Are Being Used To Deliver Malware
Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their ...
Message Recall Feature May Be Added To Office 365
For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows them to recall messages that have been sent using Outlook, ...
Kids Can Bypass Communication Limit Feature On iOS 13.3
If you have children that own Apple devices, be aware that the latest update for iOS 13.3 included a feature called Communications Limits. It is designed to allow parents to set up ...
Windows 10 Update Caused Issues With File Explorer
Have you already installed Windows 10, build 1909? If so, then you've probably noticed that the latest build update introduced a few bugs to Windows File Explorer. After installing the latest build, ...
Citrix Applications Need Patch To Address Vulnerability
Researchers at Positive Technologies recently discovered a serious vulnerability in Citrix Enterprise products that threatens the security of more than 80,000 companies in 158 countries around the world. The issue is being ...
FBI Sheds New Light On Ransomware Tactics
According to a recent FBI alert marked "TLP: AMBER," businesses should be on high alert for ransomware attacks. The alert reads, in part, as follows: "Since January 2019, LockerGoga ransomware has targeted ...
Data Breaches Continue With Three New High Profile Cases
As 2019 draws to a close, we can say definitively that the year has been another record-breaking one where data breaches are concerned. Hackers around the world have been busy in recent ...
Cashless Shopping Could Get Easier In the Future
For decades, futurists have been promising a cashless society and all the convenience that comes with it. So far though, the technology we have available hasn't lived up to the promise. Sure, ...
Apply Security Update To Protect Against Nvidia Vulnerability
Have you downloaded the NVIDIA GeForce Experience (GFE) app? It's a helper app designed to work in tandem with GeForce GTX graphics cards. It is designed to automate the process of keeping ...


