
Ransomware is Alive and Well…
Post Views: 1,494 Ransomware is alive and well…and coming to a device near you. Why? It’s plain and simple, we make it profitable. As long as we are willing to pay ...

The Surge Is On
Post Views: 1,264 There’s been a surge of Business Email Compromise (BEC) and Account Takeover (ATO) incidents of recent and it doesn’t matter the industry or the size of the organization, ...

Facebook: Enable Two-Factor Authentication (2FA)
Post Views: 1,786 I occasionally (now frequently) see a friend post that their Facebook account has been hacked. Well, here are some simple steps to follow to better secure your Facebook ...

Small Business is a Big Ransomware Target
Post Views: 4,679 More than 70% of ransomware attacks target small business, with an average time of infection to encryption within three (3) minutes. Most data breaches and ransomware outbreaks happen ...

Principle of Least Privilege
Post Views: 4,265 In a nutshell, the Principle of Least Privilege means limiting access to whom and for what is necessary to perform one’s duties. The concept of restricting access to ...

Hidden URLs, Hidden Agendas
Post Views: 3,738 Two words, URL Shorteners. We’ve all seen them and probably used them ourselves, mainly because of character limitations with postings in online services like twitter, but also just ...