Resources
Agentic AI Is Acting on Your Behalf. The Law Assumes You Meant It To.

When AI Makes Decisions, Your Organization Owns the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes an ...
Cyber Trends
Agentic AI: The Cool Tech That Could Cost You Big If You’re Not Careful

If you’ve heard of AI that can do stuff for you (not just answer questions), that’s called agentic AI. It’s powerful, exciting, and… legally risky if you don’t pay attention. Here’s the quick and practical version: what it is, why ...
The New Spiderman Is Coming for Your Business

And He Does Not Care How Good Your Antivirus Is Picture this. You’re sitting at your desk, coffee in hand, feeling pretty good about the day. Revenue looks solid. Your team is productive. IT hasn’t bothered you in weeks, which you assume means everything is fine. Then ...
“Grandpa, I need help!” — Why Vishing Just Became Everyone’s Problem

Vishing Attacks Are Up 442%—And They’re Coming for Your Family and Your CEO There’s a new scam in town—and it’s wearing a familiar voice. You’ve probably heard of phishing. But now there’s vishing—voice phishing—and according to CrowdStrike, it’s up 442% ...
Business Resilience
Why Your Team Is Busy, Exhausted, and Still Not Getting Results

It’s January, so let’s talk about something most business owners won’t admit out loud. Your team is working hard. Really hard. And somehow, at the end of the quarter, the big things you cared about still didn’t happen. You had goals. You had initiatives. You probably even had a slide deck. And yet here you are, staring at the ...
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Security Best Practices
Your Security Program Will Fail If You Do These 5 Things

Most CEOs and CFOs believe their organization is reasonably secure. You have invested in IT. You have tools in place. You have people responsible for cybersecurity. That confidence feels earned, but in many organizations it is not backed by proof. Security programs rarely ...
Why You Keep Adding Security Tools but Still Feel Unsafe

If you run a business today, you already know how overwhelming security can feel. A new scam shows up in the news, so you add a new tool. A software vendor tells you their product will keep you safe, so you subscribe. ...
Your Cyber Budget Is Growing, But So Is Your Risk

You walk into the office. The lights are on. The coffee’s brewing. Everything looks normal. Until it isn’t. Your laptop won’t boot. Your cloud drives are empty. Every desktop screen in the building is showing the same message: “Your files ...
More Articles
The Windows Follina Vulnerability Has A Temporary Fix
File this away under "good news, bad news." The bad news is that there's a new, critical zero-day threat to be concerned about. The threat has been dubbed 'Follina.' It is being ...
Microsoft Will Not Release Exchange Server Updates Until 2025
Are you planning on setting up an Exchange server soon or are you running one now? If so, be aware that Microsoft is changing their guidance when it comes to the technology ...
The Secret To Adding Security As A Separate Package
I get it. You don’t want to lose, upset, or annoy your clients. They might have signed up with you 10+ years ...
Enemybot Malware May Go Beyond DDOS Attacks
Unless you're an IT Security Professional, you may never have heard of EnemyBot. It is a bit like the Frankenstein of malware threats, a botnet that has borrowed code from multiple different ...
This Android Malware Is Stealing Login Credentials
If you're deeply involved in IT security, you may already be familiar with the ERMAC Android banking trojan. If this is the first time you're hearing of it, be aware that the ...
Screencastify Issue Could Allow Someone To Steal Recorded Videos
Are you one of the legions of users making use of the Screencastify Chrome extension? It's a fantastic Chrome extension that allows you to almost effortlessly create screencasts for a variety of ...
Update Google Chrome Soon To Fix Multiple Security Issues
Are you a Google Chrome user? If so, be aware that the company recently released a stable version of Chrome 102 and is urging all users of its browser to update right ...
General Motors Customer Data Leaked By Credential Stuffing Attacks
Do you own a Chevrolet, Buick, GMC, or Cadillac? If so, be aware that GM recently acknowledged that they fell victim to a credential stuffing attack a little over a month ago. ...
The Latest Windows 11 Update Fixes Dozens Of Issues
Are you a Windows 11 early adopter? If so, you'll want to grab the latest update KB5014019. It contains several important bug fixes including fixes for Direct3D app crashing issues, slow file ...
Are Their Cybersecurity Stacks Up To Date?
This is the question that popped up more than once in my news feed this morning. The media is keeping focus on the fact ...
Be Aware That ChromeLoader Malware Is Picking Up Steam
A browser hijacker called "ChromeLoader" has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim's web browser settings to show search ...
New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply ...


