Your TV is not even secure these days!
There are a few devices that are as well-known and seen virtually everywhere. They are located throughout our bedrooms, living rooms,...
Back-Ups: A Defensive Tool
Attackers appear to have a continued focus of revenue generation. The attack methodology has evolved from the simple disruption or...
New ransomware attacking Macs
If your small business uses Macs, you need to be sure you have strong back-up protocols in place. A new ransomware, MacRansom, is being...
Read Your Cybersecurity Insurance Policy and Coverage
The business of malware has become operationalized such that a majority of instances are to generate revenue for the attacker(s) via...
Tesla Compromise #2: Here we go again
Technology advances have improved the devices and user experience (UX) in many of the vehicle models being manufactured. These advances...
Small businesses can reduce cybersecurity breach risk with one easy action
Sometimes a cybersecurity measure can be cost-free and easy for every employee to adopt. This action won’t stop all intrusions, but it...
Convenience does not overrule common-sense and industry standards
In IT, convenience has taken much more of a focus as of late. Businesses don’t upgrade or update for a number of reasons. The user’s...
Small businesses often don’t get their files after paying ransom
In the past 12 months, 20% of small and medium businesses (SMBs) in the US reported a ransomware attack according to a survey...
Secure or Not? The “Improved” Chipped Credit Cards
Secure or Not? The “Improved” Chipped Credit Cards Attackers have become rather resilient and tenacious over time. Vulnerabilities are...
Small businesses need to know which employees might place their business in cybersecurity risk
By now, almost every savvy business leader knows that every business has cybersecurity risks. Some of that risk may be impacted by the...