Resources
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Cyber Trends
Part 2: Your Business Wasn't Targeted. It Was Available.

Last time we talked about Stryker, the hacker group that hit them, and the uncomfortable truth that they probably weren't chosen so much as they were available. The access existed, someone used it, and a Fortune 500 company spent weeks ...
Part 1: Your Business Wasn't Targeted. It Was Available.

When a big company gets hacked, the coverage almost always follows the same script. Someone chose them. Someone had a reason. There was a plan. It's presented like a heist movie where the villain spent months casing the joint before ...
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
Watch Out For Large Amounts of Scams This Holiday Season
The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber ...
Security Issues Found In Several VNC Applications
Microsoft RDP has its share of problems. That simple truth has sparked the rise of a number of open-source VNC (Virtual Network Computing) applications, which allow a user to remotely control another ...
New Cryptomining Malware Targets Windows Computers
Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass ...
Google’s Cloud Print May Be Discontinued
Are you a fan of Google's Cloud Print service? It's fantastic because it allows you to print from anywhere to anywhere, which makes it utterly invaluable. Like so many great services Google ...
New T-Mobile Data Breach Compromised Customer Info
Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a ...
New Ransomware Called DeathRansom Hits The Scene
Early in 2019, a new strain of ransomware appeared. Called "DeathRansom," its bark was initially much worse than its bite. Researchers quickly discovered that the new strain only pretended to encrypt a ...
Zombieload V2 Is Back To Wreak Havoc On Intel Chips
Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor ...
Twitter Making Changes To Their Political Ad Rules
Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content. The ...
New Ransomware Targets Removable And Attached Drives
There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. ...
Microsoft Cortana App Getting Dropped From Many Countries
It appears that Microsoft is getting rid of their Cortana App in several countries due to security concerns. The question is whether the United States will be next. Recently, the following notice ...
Hackers Are Already Targeting Disney Plus Accounts
In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...
Google Fixed The White Screen Issue On Chrome
Google recently found itself in hot water with corporate IT administrators for rolling out a feature designed to help prolong battery life. The new feature accomplished its mission, but it had an ...


