The real cost of a hack

The real cost of a hack

“It’s not an issue. We have Cybersecurity Insurance.” Many organizations opt to not take cyber-security beyond basic endpoint and firewall because they have a cybersecurity policy or at least have a clause in their business policy.  But what happens if you must...
Can Spilled Coffee Lead to a USB Attack?

Can Spilled Coffee Lead to a USB Attack?

Through the course of my day, I frequently encounter numerous stories related to occurrences at our clients or from our partners. Last week I was fortunate enough to hear about a new take on the “Dropped Device” hack.  Thumbs Down  Typically, the “Dropped Device” hack...
Is My Toaster Watching Me?

Is My Toaster Watching Me?

With all the electronic devices in my house I sometimes wonder, has someone figured out how to listen in on what’s happening at our house? After all, if you hacked our Echo or doggie camera, you certainly could.  What’s more, last week at Blackhat a company by the...
New Ransomware Brings Out the Whiteboard

New Ransomware Brings Out the Whiteboard

As many in the IT Security business are aware of, Petya Ransomware is leveraging the same Microsoft EternalBLue exploit that WannaCry targeted 30 days ago.  However, some are suggesting that the ransomware piece of Petya is not the main part of the attack, but...