In a recent CNBC quarterly survey of over 2,000 small businesses, only 5% of small business owners consider cyber attacks to be a significant risk to their company. That is not a typo. It’s 5%. Five! I would be concerned if it were ONLY 95%! What’s even more concerning…if there could be anything worse…is that […]
Zero Trust…or Don’t You Know Who I Am?
So what is Zero Trust? In college, I worked at a bank when I came home for holidays or the summer. I was a rotating teller, so I was always at different branches. Once, an elderly gentleman came to my window to cash a check. I greeted him nicely and asked for his identification to […]
“Legacy” – The Good, the Bad, and the Ugly
What do you think of when you hear the word “Legacy”? The Good – “Legacy” is what others will picture when they hear your name after you’re gone. You might want your legacy to be that you were a family man and cared for your community. Or maybe you were a devoted wife and mother. […]
Lions and Tigers and Bears…OH MY!!!!
Is nothing sacred anymore? Now, the Louisville Zoo membership information has been breached! A third-party vendor that the Louisville Zoo uses to send out emails to its patrons was hacked. This is an example of a supply chain cyber attack. (That is when a vendor/partner has legitimate access to a client’s information systems, and a […]
So, What is a “Vertical Personnel Transportation Conveyance”?
When I worked at the Washington Navy Yard in DC, I noticed one day in the elevator that the inspection certificate above the floor buttons said “vertical personnel transportation conveyance.” The other people in the elevator (conveyance) must have thought I had lost my mind when I started laughing out loud. I thought about yelling, […]
Why do I Need a Vulnerability Scan?
Relax… A vulnerability scan or penetration tests (PenTests) don’t hurt. There’s no “prep” like with a colonoscopy. But they are just as important. Sometimes, people want to skip the vulnerability scan and add on their security controls (e.g., Endpoint Detection and Response, Network Monitoring, Firewall, Anti-Virus, etc.).Sometimes, they think they are protected since they already […]