Risk cannot be outsourced. Stop making excuses. Get prepared.
Resilience is being prepared to respond to unplanned events of all kinds, having a plan to manage those events in effective ways to protect your reputation + bottom line. Here’s some tips for how to design your Resilience Strategy.
You can’t concede that you can protect your systems 100 percent of the time. You can concede, however, to be prepared for when your organization is breached.
Smaller businesses are also easy targets for cybercriminals because they typically believe these myths…
Hackers are good at finding great hiding spots but, once we discover them, they have to find new ones.
I spent some time this morning listening to the official breakdown of “The RNC Files” as the team who discovered the breach over at Upguard hosted a live broadcast.
There’s only one way to protect small business from cybercrime. Ben Greiner from Forget Computers and Chad Calease from WIMZKL sat down recently to talk about it.
As humans, our default instinct is to ignore things that threaten us until they impact us directly even as we are very weak and vulnerable to them. That’s why hardly anyone has an estate plan or business continuity strategy. The real problem is this: the less we care, the more vulnerable we are.
This is funny. Sort of. When Jimmy Kimmel went streetside and asked people, “What’s your password?” in a funny, notably exaggerated way, he revealed how easy it is to manipulate people to get their private information.
By now, after the global spread of WannaCry, we can use ‘ransomewared’ as a transitive verb. I may be trying to make light of something nasty here because it’s nasty stuff that has ruined the day for many thousands of people. I hope I never have to help anyone ever navigate their way out of such an insidious trap ever again. Unlikely, that. So, here is some solid, step-by-step advice to take should the gods forbid you ever find yourself in that most unsavory situation.
Nope. The first known ransomware attack on Macs, known as “KeRanger”, was downloaded more than 6,000 times before the threat was contained, back in early 2016. While that number is small compared to the number of ransomware attacks on computers running Windows, these threats are growing and we haven’t seen the worst of them, yet. We can expect to see more attacks on Macs. As more and more people are using them than ever before, those-so-inclined are always finding new ways to exploit Macs.
What is 2-factor authentication (2FA)? 2FA is an essential layer of security designed to ensure that you’re the only person who can access your accounts. Even if someone knows your login name and password, they won’t be able to login to your account without this one-time code that is sent to you via SMS (text message)…
Yesterday alone, I received multiple malicious links in messages sent from email accounts that had been hacked and then used to send out this latest barrage of Google Docs phishing attacks. In each of these messages was a legitimate-looking link to a shared Google Doc. Had I clicked on this link, this is what would…
My wife actually received the following voicemail message last week. It’s pretty compelling but fortunately she is aware enough to suspect these kinds of things. These kinds of scams are getting harder and harder to tell apart from real inquiries. A good general rule of thumb is: always be a little bit suspicious of unsolicited…
It’s not scary when you understand how your business works, what your risks are and how to minimize them and handle cybersecurity events when they occur. Because they will occur, which is why it’s so empowering to have a plan.
Understanding how your small business works, using the technology you already have, protects your bottom line with less effort and expense. Minimizing complexity and focusing on more deeply understanding your existing technology leads to more secure environments you can monitor and evolve with greater competency and confidence.
During medieval times, intrusion detection was handled by moats, drawbridges, palace guards and fortified structures. Nowadays, we have those, too, they’re just – different.
The value of training over certification is indisputable, especially while there is still a great deal of debate over which certifications matter, which organization to pursue them with, how to fund them and who is responsible for maintaining them.
Smaller businesses are easy targets for cybercriminals because they typically have fewer resources than large enterprises and generally like to think they’re not at risk. Research shows otherwise. Small businesses are low-hanging fruit that can give cybercriminals access to larger enterprises, which is why more and more enterprise-sized clients are demanding they step up their game through education and practical information security strategies. This preparedness is quickly becoming a differentiator as smaller agencies compete for the same clients.
Historically, one approach to making grievances heard is gather a group of people who are likewise interested in voicing their grievances, make some signs and loiter outside wherever whoever whatever company or organization grieves ya.
Things have changed.