The Need for Phishing Training

The Need for Phishing Training

This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way. This is a pure bluff....
The real cost of a hack

The real cost of a hack

“It’s not an issue. We have Cybersecurity Insurance.” Many organizations opt to not take cyber-security beyond basic endpoint and firewall because they have a cybersecurity policy or at least have a clause in their business policy.  But what happens if you must...
Can Spilled Coffee Lead to a USB Attack?

Can Spilled Coffee Lead to a USB Attack?

Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.  Thumbs Down  Typically, the “Dropped Device” hack...
What’s Your Security Plan for the Cloud?

What’s Your Security Plan for the Cloud?

If you are planning a migration to the cloud, you may want to consider a Cloud Security Assessment.  You may have already figured out which cloud services to investigate, such as Amazon or Azure.  You may also have calculated the budget requirements, the fiscal...