Why Radio Silence is the Wrong Response to a Cyber Event

May 23, 2023

SMBs have found themselves the target of such attacks increasingly often. If the same happens to you, don’t keep it secret. Transparency, especially through hard times, fosters the best long-term relationships and customer loyalty. (Read More)

Have You Heard of the Near-Ultrasound Inaudible Trojan?

May 9, 2023

Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or office? Then you’ll want to read on about this latest vulnerability in your network. (Read More)

Is Your Network Security Decentralized?

April 28, 2023

In this blog post, we’ll break down what centralized versus decentralized cybersecurity so you can better understand how your network is protected. (Read More)

A Dark Power is Rising: Behind the Emerging Ransomware Threat

April 18, 2023

As the use of Dark Power continues to increase, organizations need to take steps to protect themselves from the potential damage caused by ransomware attacks and other malicious activities associated with it. The ransom demands so far have hovered around $10K. (Read More)

Is Your Face ID Being Held Without Your Consent…or Your Knowledge?

April 11, 2023

What if it’s not a cybercriminal, though? What if legitimate security software scans, and keeps, your face ID? (Read More)

Cyber-Criminals Are Going After Crypto ATMs

March 31, 2023

Now it’s not just your digital wallets that you need to worry about. Recently, threat actors have been going after cryptocurrency ATM makers to steal millions of virtual dollars right from the source. (Read More)

What to Do with Default Apps

February 28, 2023

If you downloaded iTunes anytime in the early 2000s, you might remember being confused when it came preloaded with the U2 album, Songs of Innocence. What was that all about? (Read More)

Breach on GoDaddy Goes Back “Multiple Years”

February 21, 2023

Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website hosting platform manages over 76M domains around the world. (Read More)

Data Breach Exposes 1M CHS Patients’ PHI

February 17, 2023

Are you one of the people across America who rely on Community Health Systems? CHS is a leading operator of general acute care hospitals, with more than 200 locations across the country. (Read More)

How to Manage Third-Party Risks

February 14, 2023

Third-party risk management is a very serious and ever-more pressing need than ever before. Our monumental reliance on software as a service (SaaS) tools only grows with each new technology that we integrate into our lives. (Read More)

Roaming Mantis: Real-Time Case Study in Compromised Public WiFi

February 10, 2023

The longer you go without being negatively impacted by a data breach, it’s natural to become more blasé with some of the routine steps you take to secure your devices. (Read More)

Google Fi-ghting a SIM Swap Attack

February 7, 2023

Google is currently dealing with a cyberattack on their telecom and mobile virtual network operation (MVNO) service. Since 2016, Google Fi has been servicing what is now approximately 500K active users. (Read More)

How Encryption Really Works: A Beginner’s Guide

How Encryption Really Works: A Beginner’s Guide

January 31, 2023

Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. (Read More)

What You Need to Know About Physically Securing Your Devices

What You Need to Know About Physically Securing Your Devices

January 27, 2023

A lot of cybersecurity awareness revolves around the digital security of all your devices…but how well do you take care of their physical security? (Read More)

Smart Cars Get Duped: The New Security Flaw Found in Millions of Vehicles

Smart Cars Get Duped: The New Security Flaw Found in Millions of Vehicles

January 20, 2023

Cars can do almost anything these days. You can cool off while playing music on Bluetooth. (Read More)

Spam? Don’t Just Click, Delete

Spam? Don’t Just Click “Delete”

January 17, 2023

No matter what email platform you use, who you connect with, and where you choose to give out your email address, we all deal with it: Spam messages. (Read More)

Is Malware About to Get 60x Faster?

Is Malware About to Get 60x Faster?

January 13, 2023

Artificial intelligence has become incredibly powerful. We can create animated avatars of ourselves with just a facial scan. (Read More)

Twitter Suffers Data Breach

Twitter Suffers Data Breach of 400M+ Users

January 10, 2023

The CEO of Twitter, Elon Musk, has generated a ton of headlines since he took the helm of Twitter. (Read More)

Sharing a Computer? Be Careful What You Browse

Sharing a Computer? Be Careful What You Browse

December 27, 2022

Do you go the public library when you need to do some extra research? Have one laptop that gets used by everyone in the family as they need it? (Read More)

PHI: What is It and How to Know Yours is Protected

PHI: What is It and How to Know Yours is Protected

December 23, 2022

We’ve all been to the doctor before. Maybe you make frequent trips for a chronic illness, or do regular checkups every few year as needed. (Read More)

Uber Hacked Again

Uber Hacked Again: The Newest Data Breach on the Rideshare App

December 13, 2022

Nobody is safe from the recent plague of supply chain attacks…not even one of the largest ride share apps in the world! (Read More)