Protecting Against Black Hat Hackers

Protecting Against Black Hat Hackers

While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...
Let’s Go Island Hopping

Let’s Go Island Hopping

I recently read Carbon Blacks “Global Incident Response Threat Report” regarding the topic of Island Hopping. If you are not familiar with the term, it’s the act of a hacker gaining access to a network and then infiltrating the supply chain to gain access to clients...
The real cost of a hack

The real cost of a hack

“It’s not an issue. We have Cybersecurity Insurance.” Many organizations opt to not take cyber-security beyond basic endpoint and firewall because they have a cybersecurity policy or at least have a clause in their business policy.  But what happens if you must...
Can Spilled Coffee Lead to a USB Attack?

Can Spilled Coffee Lead to a USB Attack?

Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.  Thumbs Down  Typically, the “Dropped Device” hack...