The real cost of a hack

The real cost of a hack

“It’s not an issue. We have Cybersecurity Insurance.” Many organizations opt to not take cyber-security beyond basic endpoint and firewall because they have a cybersecurity policy or at least have a clause in their business policy.  But what happens if you must...
Can Spilled Coffee Lead to a USB Attack?

Can Spilled Coffee Lead to a USB Attack?

Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.  Thumbs Down  Typically, the “Dropped Device” hack...
What’s Your Security Plan for the Cloud?

What’s Your Security Plan for the Cloud?

If you are planning a migration to the cloud, you may want to consider a Cloud Security Assessment.  You may have already figured out which cloud services to investigate, such as Amazon or Azure.  You may also have calculated the budget requirements, the fiscal...
Why Web Security is a Never-Ending Job

Why Web Security is a Never-Ending Job

According to the White Hat 2018 “Website Security Statistics Report” there are many business verticals missing the mark on securing their websites. In the category of Accommodations/Food Services, 52% of websites are deemed as “Always Vulnerable.” Another 7% are...