The Cybersecurity and Infrastructure Security Agency (CISA) recently released a detailed report about the ransomware-du-jour, BlackMatter. Similar to other Ransomware-as-a-Service threat vectors (which we’ve written about before), it’s cheap and easy to deploy, utterly devastating to infected systems, and cause for real concern in the IT community. I wish this wasn’t such a tired story, but this is life in … Read More
How SIEM can protect your business from cyberattacks
There really is no way to overstate the cyberthreat environment small and medium-sized businesses find themselves in today. Attacks are up across the board (and not just for large enterprises). The tools hackers are using are both more advanced and more pernicious… all while being more widely available. Now, this shouldn’t come as that big of a surprise to anyone … Read More
President Biden calls critical meeting to combat cyberattacks
News of cyberattacks are no longer the exclusive purview of industry publications. They’re not even confined to the more niche tech publications like The Verge or Wired any more. No, cybersecurity (and the inevitable failures when they occur) is so integral to modern life, that when almost any breach occurs, it’s international news across medium and outlet. Even companies that … Read More
Phishing attempts (and success rate) through the roof in 2021
Phishing. It’s a tale as old as time (well, as old as email, anyway…). It’s been a persistent threat for decades, but is becoming more sophisticated, more successful and more insidious with every passing year. Yes, our understanding and expectations of being phished are rising… but so too are the skill, cunning and ruthlessness of the phishers. And so far … Read More
Ransomware-as-a-Service — the darker side of the Colonial Pipeline hack
It would have been pretty hard to miss the news of the Colonial Pipeline hack. We wrote about it here to advise our enterprise clients what they needed to know about, and what it meant for their collective futures. It got play in outlets the media world over, and for good reason — when the pipeline that feeds the entire … Read More
Colonial Pipeline hack — what your business needs to know
About two weeks ago, one of the largest physical infrastructure cyberattacks perpetrated against the United States hit the Colonial Pipeline. That pipeline, responsible for nearly 50% of the East Coast’s fuel, had to be shut down for a significant period of time before the company capitulated and paid the ransom demand to regain access to their critical files. It was … Read More
Are you truly ready for a phased return to the office? Or the new hybrid normal?
I think many of us who had the privilege of being able to work from home during this pandemic have gone through waves of a love/hate relationship with WFH. At first, we hated it because it was such a stark departure from our normal lives, and many of the collaboration tools and office etiquette wasn’t ready for a fully remote … Read More
Slack connect takes collaboration to a whole new dimension
Productivity tools have been on the rise since… well… the Industrial Revolution? I mean, in a certain sense, each industrial invention created during the Industrial Revolution was in some way designed to make things more efficient and/or productive. Not all that much has changed in the interim. It’s just that now, those productivity tools usually come in one of two … Read More
How to manage security threats in the new WFH normal
Work from home (WFH) has moved from a side effect of covid mitigation necessity to the new working normal for a lot of high-profile companies (Twitter, Facebook, etc.). Obviously not every company in the country can or wants to go full-time WFH, nor should they. But, some version of increased flexibility and/or hybrid working arrangements are going to become the … Read More
What to know about new malware if your company runs on Mac
Mac lovers have touted multiple advantages over Windows-based machines for years. These claims haven’t always been substantiated by real data, sure… but folks love Apple computers and have for a while now. One of the advantages claimed for years and years is that Macs are less vulnerable to hacking, ransomware, malware, etc. While that may have been true a decade … Read More
Dive straight into the feedback!Login below and you can start commenting using your own user instantly