In a recent CNBC quarterly survey of over 2,000 small businesses, only 5% of small business owners consider cyber security the biggest risk to their company. That is not a typo. It’s 5%. Five! I would be concerned if it were ONLY 95%!What’s even more concerning…if there could be anything worse…is that it was 5% […]
Zero Trust…or Don’t You Know Who I Am?
In college, I worked at a bank when I came home for holidays or the summer. I was a rotating teller, so I was always at different branches.Once, an elderly gentleman came to my window to cash a check. I greeted him nicely and asked for his identification to cash the large check drawn on […]
“Legacy” – The Good, the Bad, and the Ugly
What do you think of when you hear the word “Legacy”?The Good – “Legacy” is what others will picture when they hear your name after you’re gone. You might want your legacy to be that you were a family man and cared for your community. Or maybe you were a devoted wife and mother. Or […]
Lions and Tigers and Bears…OH MY!!!!
Is nothing sacred anymore? Now the Louisville Zoo membership information has been breached!A third-party vendor that the Louisville Zoo uses to send out emails to its patrons was hacked. This is an example of a supply chain cyber attack. (That is when a vendor/partner has legitimate access to a client’s information systems and a cyber […]
So, What is a “Vertical Personnel Transportation Conveyance”?
When I worked at the Washington Navy Yard in DC, one day in the elevator, I noticed that the inspection certificate above the floor buttons said “vertical personnel transportation conveyance.” The other people in the elevator (I mean conveyance) must have thought I had lost my mind when I started laughing out loud.I thought about […]
Why do I Need a Vulnerability Scan?
Relax…Vulnerability Scans and Penetration Tests (PenTests) don’t hurt. There’s no “prep” like with a colonoscopy. But they are just as important.Sometimes people want to skip the vulnerability scan and add on their security controls (e.g., Endpoint Detection and Response, Network Monitoring, Firewall, Anti-Virus, etc.).Sometimes they think that they are protected since they already have a […]