It’s fair to say that many of us, especially in the States, don’t know or much care about where our food comes from. That’s unfortunate enough but what even less people may be aware of is how cool farming cultures are. Farmers survive by quickly learning how to do many things when they need to…
Organizations are all working hard in collaboration to bring Atlanta’s critical systems back online but there is still a tremendous amount of work to be done and some serious lessons to be learned.
Learn about DMARC and vastly reduce the chance of you or your team getting a phishing attack in your inbox.
Hackers are good at finding great hiding spots but, once we discover them, they have to find new ones.
As humans, our default instinct is to ignore things that threaten us until they impact us directly even as we are very weak and vulnerable to them. That’s why hardly anyone has an estate plan or business continuity strategy. The real problem is this: the less we care, the more vulnerable we are.
This is funny. Sort of. When Jimmy Kimmel went streetside and asked people, “What’s your password?” in a funny, notably exaggerated way, he revealed how easy it is to manipulate people to get their private information.
What is 2-factor authentication (2FA)? 2FA is an essential layer of security designed to ensure that you’re the only person who can access your accounts. Even if someone knows your login name and password, they won’t be able to login to your account without this one-time code that is sent to you via SMS (text message)…
My wife actually received the following voicemail message last week. It’s pretty compelling but fortunately she is aware enough to suspect these kinds of things. These kinds of scams are getting harder and harder to tell apart from real inquiries. A good general rule of thumb is: always be a little bit suspicious of unsolicited…
Seven days after the release of more than 65 million people were playing it. SIXY-FIVE MILLION PEOPLE.
That’s a big statement about how humans are interacting with machines. Not as in the future but as in RIGHT NOW.
It’s not scary when you understand how your business works, what your risks are and how to minimize them and handle cybersecurity events when they occur. Because they will occur, which is why it’s so empowering to have a plan.
Understanding how your small business works, using the technology you already have, protects your bottom line with less effort and expense. Minimizing complexity and focusing on more deeply understanding your existing technology leads to more secure environments you can monitor and evolve with greater competency and confidence.
During medieval times, intrusion detection was handled by moats, drawbridges, palace guards and fortified structures. Nowadays, we have those, too, they’re just – different.
The value of training over certification is indisputable, especially while there is still a great deal of debate over which certifications matter, which organization to pursue them with, how to fund them and who is responsible for maintaining them.
Smaller businesses are easy targets for cybercriminals because they typically have fewer resources than large enterprises and generally like to think they’re not at risk. Research shows otherwise. Small businesses are low-hanging fruit that can give cybercriminals access to larger enterprises, which is why more and more enterprise-sized clients are demanding they step up their game through education and practical information security strategies. This preparedness is quickly becoming a differentiator as smaller agencies compete for the same clients.
Historically, one approach to making grievances heard is gather a group of people who are likewise interested in voicing their grievances, make some signs and loiter outside wherever whoever whatever company or organization grieves ya.
Things have changed.
It’s not a big secret. Small business needs to be much more proactive about cybersecurity. Smaller businesses are easy targets for cybercriminals because they typically have fewer resources than large enterprises and generally like to think they’re not at risk. Research shows otherwise.
The vast majority of people are compelled to follow best practices while doing things involving risk, such as rock climbing. There is less than a single percent of free-climbers among the whole of rock climbing cultures. The odds of falling during those types of climbs are high enough to not want to talk about it. Why, then, do businesses operate without a rope?
CENTRALIZATION (DIY) vs. DECENTRALIZATION (DIT) The first part of this riff, that I wrote over on my personal blog awhile back, built an analogy that centralization is like DIY (Do-it-Yourself) and decentralization is like DIT (Do-it-Together). If we can agree on that analogy, simply for the sake of conversation, then we can take it a step…
Hackers generally fall into one of three types of “hats”: black, white and grey.
Ever made a 14-second film?
We made one. A documentary about sticks.
The crowd went wild for it.