Every free public wi-fi connection comes with a cost you cannot see on the terms-of-service screen. Last month, a county clerk in eastern Kentucky stopped at a coffee shop between meetings and logged into the office email over the shop’s public wi-fi. Nothing seemed wrong. Two weeks later, her office discovered that someone had intercepted […]
A Cyber Attack Hollywood Finally Got Right!
Halfway through the second season of HBO’s The Pitt, the fictional Pittsburgh Trauma Medical Center loses its computers to a cyber attack. Not to a direct hit. A neighboring hospital is hit by ransomware, and Pittsburgh Trauma shuts down its network as a precaution. In minutes, the emergency room goes analog. Nurses dig for paper […]
Demystifying Artificial Intelligence and Cyber Security
Many people are excited about Artificial Intelligence, while others fear it. Both perspectives are valid! A county clerk in western Kentucky asked me a quiet question last month. Was it safe to open the email attachments her vendor sent her every week? She was not being foolish. A neighboring county had just been locked out […]
FBI’s 2025 Internet Crime Report: What You Need to Know
The FBI’s Internet Crime Complaint Center (IC3) released its 2025 Annual Report this week, and the numbers are impossible to ignore. For the first time in the agency’s 25-year history of tracking cybercrime, the IC3 received more than one million complaints in a single year, 1,008,597 to be exact. Total losses hit a record $20.87 […]
Non-Profit Cyber Security You Can’t Afford to Ignore It!
If you run a non-profit, you probably spend most of your time thinking about your mission, not your IT infrastructure. You’re focused on serving your community, stretching every dollar, and keeping your programs running. Cyber security might feel like a concern for big corporations with deep pockets and dedicated tech teams. But here’s the reality: […]
Trusted Software: The Attack Vector You Already Approved
Think about the trusted software your business runs on every day. Accounting software. Payroll systems. The program your hospital uses to track patient records. The app your power company relies on to keep the lights on. You trust these tools completely. You have to because without them, nothing works. But what happens when that trusted […]






