In cyber security, you have to be perfect 100% of the time. Cyber criminals only have to be lucky once. That’s why, in cyber security, it is also critical to be prepared if the worst does happen with an effective and well-rehearsed incident response plan. You can make your digital life much more secure by […]
10 Billion Password Leak Sets New Record, at Least for Now!
July 4, 2024, brought cyber crime fireworks worldwide as 10 billion passwords (yes, that’s 10 with 9 MORE ZEROS – 10,000,000,000) were leaked on a hacking forum. It’s being called RockYou2024, and it is the biggest password leak in history, at least for now. However, the info dump is primarily previously leaked passwords including another […]
Collateral Damage: How A Vendor Cyber Breach Can Cripple You
Imagine having a cyber breach and losing access to all your organization’s technology—accounts receivable, accounts payable, appointment scheduling, everything except that landline that your Gen Z employees secretly roll their eyes at. You can revert to using pen and paper, right? You could probably manage. You were born in the 1900s, the era of scrappy […]
Divide and Conquer: The Essential Guide to Separating Work and Personal Devices
How many electronic devices are you juggling between your personal life and workplace? How many devices do you really need to maintain an ethical, practical, and user-friendly balance between the two? If you are a single device user for the sake of convenience and blur the work and personal lines, you could be a serious […]
Business Email Compromise: The Unseen Dangers in Your Inbox
Arlington, Massachusetts, a town of about 40,000, recently awoke to a huge cyber crime problem— Business Email Compromise (BEC). Jim Feeney, Arlington’s town manager, described the crime in detail to his citizens. In September of 2023, Town employees received legitimate emails from a known vendor working on the Arlington High School Building Project to discuss […]
Don’t Be Your Cyber Security Weakest Link – Three Steps to ensure you stay Cyber Safe!
Strong cyber security begins with basic steps that should be executed by anyone and everyone in your organization. If you feel like you have heard the following advice before, it’s because hackers are still successfully exploiting these weaknesses every day. A Stanford University study found that 88% of data breaches were caused by employee error. […]