Resources
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
Cyber Trends
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
More Articles
New Cryptomining Malware Targets Windows Computers
Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass ...
Google’s Cloud Print May Be Discontinued
Are you a fan of Google's Cloud Print service? It's fantastic because it allows you to print from anywhere to anywhere, which makes it utterly invaluable. Like so many great services Google ...
New T-Mobile Data Breach Compromised Customer Info
Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a ...
New Ransomware Called DeathRansom Hits The Scene
Early in 2019, a new strain of ransomware appeared. Called "DeathRansom," its bark was initially much worse than its bite. Researchers quickly discovered that the new strain only pretended to encrypt a ...
Zombieload V2 Is Back To Wreak Havoc On Intel Chips
Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor ...
Twitter Making Changes To Their Political Ad Rules
Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content. The ...
New Ransomware Targets Removable And Attached Drives
There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. ...
Microsoft Cortana App Getting Dropped From Many Countries
It appears that Microsoft is getting rid of their Cortana App in several countries due to security concerns. The question is whether the United States will be next. Recently, the following notice ...
Hackers Are Already Targeting Disney Plus Accounts
In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...
Google Fixed The White Screen Issue On Chrome
Google recently found itself in hot water with corporate IT administrators for rolling out a feature designed to help prolong battery life. The new feature accomplished its mission, but it had an ...
Android Devices Using Qualcomm Chips Can Be Hacked
Do you have an Android device? Is it built around a Qualcomm chipset? If so, be advised that you may be at risk. According to a report recently published by security firm ...
Public Chargers Can Expose Your Device To Hacking And Malware
On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give ...


