Blog
Latest Post

The Need for Phishing Training
This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way.
Recent

The real cost of a hack
The cost of prevention is much cheaper than the fallout related to an actual hack. Learn more now.

Can Spilled Coffee Lead to a USB Attack?
Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.

Explaining the Cost of Security to Business Leaders
Well... the sky isn’t falling, or if it is, it has been falling at the same consistent rate for a long time. That’s the way a business line manager hears it when it comes to IT security. Business leaders know that they need security but aren’t sure if Next Gen...

What’s Your Security Plan for the Cloud?
If you are planning a migration to the cloud, you may want to consider a Cloud Security Assessment. You may have already figured out which cloud services to investigate, such as Amazon or Azure.
More Posts
The Need for Phishing Training
This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way.
The real cost of a hack
The cost of prevention is much cheaper than the fallout related to an actual hack. Learn more now.
Can Spilled Coffee Lead to a USB Attack?
Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.
Explaining the Cost of Security to Business Leaders
Well... the sky isn’t falling, or if it is, it has been falling at the same consistent rate for a long time. That’s the way a business line manager hears it when it comes to IT security. Business leaders know that they need security but aren’t sure if Next Gen...
What’s Your Security Plan for the Cloud?
If you are planning a migration to the cloud, you may want to consider a Cloud Security Assessment. You may have already figured out which cloud services to investigate, such as Amazon or Azure.
Why Web Security is a Never-Ending Job
According to the White Hat 2018 “Website Security Statistics Report” there are many business verticals missing the mark on securing their websites. In the category of Accommodations/Food Services, 52% of websites are deemed as “Always Vulnerable.”
How to Explain IT Security Risks to Executives
Business leaders don’t always view security threats the same way that IT departments do. Business people think about spend in a risk reward paradigm. They tend to ask questions like; What am I getting for the dollars being spent? Will this purchase make us more secure?
Whaling and How to Protect Yourself Against CEO Fraud
Unfortunately, these days most of us are very familiar with Phishing and Spear Phishing Attacks. Most often times hackers will target end users with a clever email that unwittingly opens an attack vector on the users machine.
When a Phone Call Beats Web Research
Not that long ago I identified that our Primary DC was not replicating to the secondary DC. After some investigation, I figured out that the secondary was handling all of the Domain Traffic and the GPO. The primary was handling only DNS and DHCP.