Beware of links, especially shortened links and especially this time of year Don’t just click on the link! (Especially this time of year). Keep these ideas in mind next time you’re about to click on some random link you got over social media or email.
Here’s a friendly list of DO’s and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
Do it now. As a leader, your employees, partners and clients count on you to lead the way through when Cyber Attacks impact your business. The Cyber Resilience Playbook makes sure you are ready to lead by knowing how to respond quickly, accurately and confidently.
Technology Infrastructure Architecture Design Dashboards + Visibility Internal Network Architecture Design Example External Network Architecture Design Example (AWS) Cloud Migration + Technology Transformation Process Identity Access Management (AWS) Read complete article on Peerlyst
Learn about DMARC and vastly reduce the chance of you or your team getting a phishing attack in your inbox.
It’s important for us to understand the implications of the Equifax breach and ways to protect our identities. What options are best? Experts on the subject suggest freezing our credit. What does that mean? What does it involve and what do we need to know?
WIMZKL was recently engaged in a forensic investigation. The biggest lesson? Teams that aren’t balancing their defensive practice with offensive fluency, and frequently testing their own defenses, will be no match for attackers who are iterating, evolving and learning exponentially faster.
IBM’s Threat Intelligence Index verifies that humans are still the weakest links within organizations and play the major role in making cyberattacks successful. How do we help turn this around by transforming them from our weakest links into our greatest assets for protecting our organizations against cyberattacks?
Hackers hate and avoid organizations with a culture that values and actively promotes Cyber Resilience Awareness. Their employees don’t make mistakes easily like organizations without one.
You can’t concede that you can protect your systems 100 percent of the time. You can concede, however, to be prepared for when your organization is breached.
Smaller businesses are also easy targets for cybercriminals because they typically believe these myths…
Hackers are good at finding great hiding spots but, once we discover them, they have to find new ones.
I spent some time this morning listening to the official breakdown of “The RNC Files” as the team who discovered the breach over at Upguard hosted a live broadcast.
There’s only one way to protect small business from cybercrime. Ben Greiner from Forget Computers and Chad Calease from WIMZKL sat down recently to talk about it.
As humans, our default instinct is to ignore things that threaten us until they impact us directly even as we are very weak and vulnerable to them. That’s why hardly anyone has an estate plan or business continuity strategy. The real problem is this: the less we care, the more vulnerable we are.
This is funny. Sort of. When Jimmy Kimmel went streetside and asked people, “What’s your password?” in a funny, notably exaggerated way, he revealed how easy it is to manipulate people to get their private information.
By now, after the global spread of WannaCry, we can use ‘ransomewared’ as a transitive verb. I may be trying to make light of something nasty here because it’s nasty stuff that has ruined the day for many thousands of people. I hope I never have to help anyone ever navigate their way out of such an insidious trap ever again. Unlikely, that. So, here is some solid, step-by-step advice to take should the gods forbid you ever find yourself in that most unsavory situation.
Nope. The first known ransomware attack on Macs, known as “KeRanger”, was downloaded more than 6,000 times before the threat was contained, back in early 2016. While that number is small compared to the number of ransomware attacks on computers running Windows, these threats are growing and we haven’t seen the worst of them, yet. We can expect to see more attacks on Macs. As more and more people are using them than ever before, those-so-inclined are always finding new ways to exploit Macs.