Why Radio Silence is the Wrong Response to a Cyber Event
May 23, 2023
SMBs have found themselves the target of such attacks increasingly often. If the same happens to you, don’t keep it secret. Transparency, especially through hard times, fosters the best long-term relationships and customer loyalty. (Read More)
Have You Heard of the Near-Ultrasound Inaudible Trojan?
May 9, 2023
Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or office? Then you’ll want to read on about this latest vulnerability in your network. (Read More)
Is Your Network Security Decentralized?
April 28, 2023
In this blog post, we’ll break down what centralized versus decentralized cybersecurity so you can better understand how your network is protected. (Read More)
A Dark Power is Rising: Behind the Emerging Ransomware Threat
April 18, 2023
As the use of Dark Power continues to increase, organizations need to take steps to protect themselves from the potential damage caused by ransomware attacks and other malicious activities associated with it. The ransom demands so far have hovered around $10K. (Read More)
Is Your Face ID Being Held Without Your Consent…or Your Knowledge?
April 11, 2023
What if it’s not a cybercriminal, though? What if legitimate security software scans, and keeps, your face ID? (Read More)
Cyber-Criminals Are Going After Crypto ATMs
March 31, 2023
Now it’s not just your digital wallets that you need to worry about. Recently, threat actors have been going after cryptocurrency ATM makers to steal millions of virtual dollars right from the source. (Read More)
What to Do with Default Apps
February 28, 2023
If you downloaded iTunes anytime in the early 2000s, you might remember being confused when it came preloaded with the U2 album, Songs of Innocence. What was that all about? (Read More)
Breach on GoDaddy Goes Back “Multiple Years”
February 21, 2023
Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website hosting platform manages over 76M domains around the world. (Read More)
Data Breach Exposes 1M CHS Patients’ PHI
February 17, 2023
Are you one of the people across America who rely on Community Health Systems? CHS is a leading operator of general acute care hospitals, with more than 200 locations across the country. (Read More)
How to Manage Third-Party Risks
February 14, 2023
Third-party risk management is a very serious and ever-more pressing need than ever before. Our monumental reliance on software as a service (SaaS) tools only grows with each new technology that we integrate into our lives. (Read More)
Roaming Mantis: Real-Time Case Study in Compromised Public WiFi
February 10, 2023
The longer you go without being negatively impacted by a data breach, it’s natural to become more blasé with some of the routine steps you take to secure your devices. (Read More)
Google Fi-ghting a SIM Swap Attack
February 7, 2023
Google is currently dealing with a cyberattack on their telecom and mobile virtual network operation (MVNO) service. Since 2016, Google Fi has been servicing what is now approximately 500K active users. (Read More)
How Encryption Really Works: A Beginner’s Guide
January 31, 2023
Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. (Read More)
What You Need to Know About Physically Securing Your Devices
January 27, 2023
A lot of cybersecurity awareness revolves around the digital security of all your devices…but how well do you take care of their physical security? (Read More)
Smart Cars Get Duped: The New Security Flaw Found in Millions of Vehicles
January 20, 2023
Cars can do almost anything these days. You can cool off while playing music on Bluetooth. (Read More)
Spam? Don’t Just Click “Delete”
January 17, 2023
No matter what email platform you use, who you connect with, and where you choose to give out your email address, we all deal with it: Spam messages. (Read More)
Is Malware About to Get 60x Faster?
January 13, 2023
Artificial intelligence has become incredibly powerful. We can create animated avatars of ourselves with just a facial scan. (Read More)
Twitter Suffers Data Breach of 400M+ Users
January 10, 2023
The CEO of Twitter, Elon Musk, has generated a ton of headlines since he took the helm of Twitter. (Read More)
Sharing a Computer? Be Careful What You Browse
December 27, 2022
Do you go the public library when you need to do some extra research? Have one laptop that gets used by everyone in the family as they need it? (Read More)
PHI: What is It and How to Know Yours is Protected
December 23, 2022
We’ve all been to the doctor before. Maybe you make frequent trips for a chronic illness, or do regular checkups every few year as needed. (Read More)
Uber Hacked Again: The Newest Data Breach on the Rideshare App
December 13, 2022
Nobody is safe from the recent plague of supply chain attacks…not even one of the largest ride share apps in the world! (Read More)