3 min read
Urgent Warning about Bank Account Fraud
The infamous Xenomorph Android malware, known for targeting 56 European banks in 2022, is back and in full force targeting US banks, financial institutions, and cryptocurrency wallets.
Read MoreArticles for business leaders covering topics such as technology, cybersecurity, and compliance.
3 min read
The infamous Xenomorph Android malware, known for targeting 56 European banks in 2022, is back and in full force targeting US banks, financial institutions, and cryptocurrency wallets.
Read More3 min read
Is your business plan for 2024 finalized yet? The last few months of the year can get hectic, between trying to close out the end of the quarter...
3 min read
When you run your own business, it feels like there are never enough hours in the day. Even when you start early and end late, there’s always...
3 min read
Recently, the CEO of a very successful marketing firm had their Facebook account hacked. In just a weekend, the hackers were able to run over...
2 min read
On November 30th, Apple released an urgent update, iOS 17.1.2, that aims to patch two possible security exploits documented in 17.1.1.
3 min read
With Black Friday and Cyber Monday right around the corner, here are some tips for a safe and secure online shopping experience.
3 min read
“Thank goodness” is probably what Illinois-based manufacturing company ICS thought about having a cyber insurance policy with Travelers Insurance...
2 min read
If you ask a security professional, you get by-the-book advice about sharing passwords: “Don’t share passwords.” But we know, in reality, that...
2 min read
It’s 10:00 p.m. – do you know where your children are? Google probably does. Thanks to Google Maps’ Timeline feature, the tech company probably knows...
2 min read
36% of survey participants reported installing the latest updates and software as soon as they become available. Of those who reported installing the...
2 min read
72% of respondents reported that they checked to see whether messages were legitimate (i.e. phishing or a scam) compared to 15% who reported not...
1 min read
In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multifactor authentication (MFA), but many people...
2 min read
Only 33% of individuals create unique passwords for all accounts (NCA)
2 min read
October isn't just about falling leaves and pumpkin spice; it's also Cybersecurity Awareness Month, established in 2004 and dedicated to raising...
3 min read
If you’ve turned on the news sometime during the past few years, you’ve probably heard of more than one instance where a business closed due to a...
3 min read
IT services are necessary for every business in the country – IT companies help businesses protect their data, ensure day-to-day operations run...
2 min read
Compliance standards are some of the most important things a business needs to maintain to be profitable and well-respected while staying out of...
2 min read
Back-to-school season has finally arrived, and it won’t be long before our kids are back in the classroom, learning all sorts of different subjects....
1 min read
If you've had a breach, statistically the likelihood of you having a second breach or more is very high.
6 min read
The days when cybersecurity was solely the concern of IT departments are long gone.
3 min read
OneDrive and SharePoint in Microsoft 365 are popular cloud-based collaboration, productivity, and file storage solutions to help organizations share...
4 min read
Many organizations assume that moving to a cloud-based collaboration app such as Microsoft 365 or Google Workspace means email security and backup is...
1 min read
The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations...
1 min read
Top 5 Cybersecurity Musts. So, what can you do?
4 min read
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,...
1 min read
The cyber insurance market is getting stricter with its application questions and requirements.
2 min read
The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.
1 min read
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...
1 min read
Cybersecurity is much more than the tools.
1 min read
So here's the critical thing, the myth. And I touched on it a minute ago.
1 min read
Hacking people, not technology.
4 min read
Have you heard of a cybersecurity tabletop exercise or tabletop drill?
1 min read
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and...
1 min read
Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.
6 min read
“If it ain’t broke, don’t fix it.” But is this approach harming your business?
1 min read
Tek Video: Endpoint Security vs. Antivirus