Cyber criminals continually look for ways to steal personal information from private accounts. Getting access to info isn’t enough; hackers want to control profiles like your social media or your work email account. Once they do, they can spread phishing scams to your followers and friends list, see confidential data available only to administrators, and […]
Cyber security is not a destination. It’s a never-ending journey
It can happen to anybody at any time. As the investigation continues and the Jefferson County Clerk’s office struggles to return to normal operations, this is one of several important lessons that all government offices and small businesses can take away from this cyber attack in Kentucky’s largest county. In a press conference on Thursday, […]
Quishing: From Convenience to Catastrophe the Dark Side of QR Codes
Phishing is the number-one cause of data breaches for organizations, large and small. With 95% of data breaches caused by simple human error, it’s essential to comprehend the risks associated with phishing schemes. The newest and most common type of phishing is something called quishing. Traditionally, phishing scams are delivered via email. Red flags include […]
Incident Response Heroes: Guardians of the Network in Cyber Security
In cyber security, you have to be perfect 100% of the time. Cyber criminals only have to be lucky once. That’s why, in cyber security, it is also critical to be prepared if the worst does happen with a practical and well-rehearsed incident response plan. You can make your digital life much more secure by […]
10 Billion Password Leak Sets New Record, at Least for Now!
July 4, 2024, brought cyber crime fireworks worldwide as 10 billion passwords (yes, that’s 10 with 9 MORE ZEROS – 10,000,000,000) were leaked on a hacking forum. It’s being called RockYou2024, the most significant password leak in history, at least for now. However, the info dump primarily reveals previously leaked passwords, including another gigantic leak […]
How the Cyber Breach a Vendor Can Make You Collateral Damage
Imagine having a cyber breach and losing access to all your organization’s technology—accounts receivable, accounts payable, appointment scheduling, everything except that landline that your Gen Z employees secretly roll their eyes at. You can revert to using pen and paper, right? You could probably manage. You were born in the 1900s, the era of scrappy […]






