Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Update Amazon Blink Cameras To Fix Security Vulnerabilities
Do you have a home security system that incorporates Amazon's Blink XT2 cameras? If so, be advised that researchers at Tenable Security recently identified several serious security flaws that would allow an ...
Ransomware Uses New Method To Get Past Antivirus Programs
Researchers at SophosLabs have discovered a new threat to be on the alert for. A variant of the Snatch ransomware has been spotted in the wild. It features an innovative means of ...
Windows 10 Mobile OS Complete End of Life Is Here
Are you using a device that's running on Windows 10 Mobile? If so, you don't have a lot of company. Sadly, the OS never really caught on. Microsoft pulled the plug on ...
New Gmail Attachment Feature Makes Forwarding Easier
Google has a solid reputation when it comes to making a steady stream of improvements to its large and growing base of products and services. They have a demonstrated a track record ...
About Half A Million Credit Cards Found On Dark Web
Researchers from Group-IB monitor the Dark Web and have recently reported the appearance of nearly half a million credit card records available for sale. Each record is valued at more than ...
New Trojan Malware Steals Passwords From Chrome
If you use Google's Chrome web browser, there's a new threat you should be aware of. A new trojan targeting Windows-based machines will attempt to steal passwords stored in the Chrome browser. ...
New Malware Can Spy On You In Scary Ways
There's a new strain of malware in the wild. It is targeting Android devices and disguised as an innocuous chat app. Researchers at Trend Micro have discovered it in two different apps ...
Phishing Emails Are Becoming Even Harder To Identify
According to data collected by Microsoft, phishing emails accounted for 0.62 percent of all inbox receipts in September 2019. That's up from 0.31 percent just one year prior to that. The increase ...
Ransomware Is Getting Smarter. Are You?
One prolific ransomware virus variant is getting smarter. That’s right—one particular strain of the Ryuk ransomware is now working smarter than first expected. It has a decision process that doesn’t wait for large files to get encrypted. Instead, it encrypts ...
FBI Considers Aging App To Be A Counterintelligence Threat
FaceApp is in the news again, and as before, not for a good reason. Several months ago, watchdog groups around the world sounded the alarm about the Russian-made app, which raised curious ...
Be Careful Holiday E-cards Could Contain Malware Or Viruses
There's a war on Thanksgiving and Christmas, but it's taking a very different form than what commonly gets reported in the news media. This war is being waged by hackers and scammers, ...
Adobe Acquired Magento Marketplace Suffers Data Breach
Recently, the Magento Marketplace was acquired by Adobe and suffered a breach that exposed a limited amount of user data to an unknown third party. When Adobe discovered evidence of the breach, ...


