Get Our Weekly Blog Sent Straight to Your Inbox
Medical Devices are Vulnerable to Cyberattacks
It's not easy to place a recall on implanted medical devices. Imagine what that could look like for someone with a pacemaker. Consider the consequences of a vulnerability that allows a malicious actor to take remote control over a device like this. The...
Compliance: You Actually Need It
One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business owns....
Five Places You May Have Dropped the Ball on Security
It wasn't that long ago that businesses' largest concern was having a decent lock on their doors to secure the premises. It's obvious that we've come a long way and so have bad actors. Fast forward a bit and many businesses invested in email security...
Passwords, Lies and Webcam Recordings
Email content filters have come a long way in recent years. Tremendous strides have been made in protecting us from the never-ending wave of malware and malicious intent. However, cybercriminals (if nothing else) are very creative and not easily...
Business Email Compromise Scams are Through the Roof
Everyone is on the alert and it's for good reason. Just a week ago, the Feds indicted 80 people in a massive fraud conspiracy. U.S. Attorney Nick Hanna states, "We believe this is one of the largest cases of its kind in U.S. history." According to the...
I Was Going To Get To That
With new tools and technology constantly being introduced into the market, have you ever wondered why vulnerabilities that have been around for years just won't die? One big reason is PATCH MANAGEMENT.
Exploiting the Content Filter
Ever wonder how that phishing email slipped by your state-of-the-art mail defenses? These days hackers find it’s not enough just to fool users with URL manipulation techniques. In the past, successful phishing campaigns might have yielded hundreds of...
Identity Access Management and How it Applies to Security
IAM: Knowing your Roles. “Know your role!”, is a famous quote from professional wrestler, turned actor, Dwayne “The Rock” Johnson. How does this apply to Information Security? Well, sit back and let me explain how a small quote from a giant man can be...
Think Like a Hacker
You are probably familiar with the saying, "If you can't beat them, join them." The same philosophy applies to cybersecurity. To really get inside the mind of a hacker, you need to think like a hacker, otherwise known as "white hat" hacking. Malicious...
How to Determine the Cybersecurity Needs of Your Business
The Cybersecurity Cost Center Problem One of the most challenging aspects of working in cybersecurity is demonstrating value. Despite the breaches that dominate the news and the headlines surrounding ransomware wreaking havoc on organizations each day,...
Security Awareness Training as part of Onboarding New Hires
Often onboarding new hires includes a lot of administrative tasks often fulfilled by HR but there are quite a few important onboarding procedures that relate to security. There's plenty of reasons why security awareness training should be part of every...
Securing Your IoT Home
The Internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring...