In a recent CNBC quarterly survey of over 2,000 small businesses, only 5% of small business owners consider cyber attacks a significant risk to their companies. That is not a typo. It’s 5%. Five! I would be concerned if it were ONLY 95%! What’s even more concerning…if there could be anything worse…is that it was […]
Zero Trust? Or Don’t You Know Who I Am?
So what is Zero Trust? In college, I worked at a bank when I came home for holidays or the summer. I was a rotating teller, so I was always at different branches. Once, an elderly gentleman came to my window to cash a check. I greeted him nicely and asked for his identification to […]
“Legacy” – The Good, the Bad, and the Ugly
What do you think of when you hear the word “Legacy”? The Good – “Legacy” What others will picture when they hear your name after you’re gone. You might want your legacy to be that you were a family man and cared for your community. Or maybe you were a devoted wife and mother. Or […]
Lions and Tigers and Bears…OH MY!!!!
Is nothing sacred anymore? Now, the Louisville Zoo membership information has been breached! A third-party vendor that the Louisville Zoo uses to send out emails to its patrons was hacked. This is an example of a supply chain cyber attack. (That is when a vendor/partner has legitimate access to a client’s information systems, and a […]
What Does Cyber Security have to do with “Vertical Personnel Transportation Conveyance?”
Before I owned a cyber security company, I worked at the Washington Navy Yard in DC I noticed one day in the elevator that the inspection certificate above the floor buttons said “vertical personnel transportation conveyance.” The other people in the elevator (conveyance) must have thought I had lost my mind when I started laughing […]
Why do I Need a Vulnerability Scan?
Relax… A vulnerability scan or a penetration test (PenTests) doesn’t hurt. There’s no “prep” like with a colonoscopy. But they are just as important. Sometimes, people want to skip the vulnerability scan and add on their security controls (e.g., Endpoint Detection and Response, Network Monitoring, Firewall, Anti-Virus, etc.).Sometimes, they think they are protected since they […]





