Microsoft Power apps misconfiguration exposes 38MM sensitive records

misconfiguration

Not every major data breach or cybersecurity incident is the work of master hackers with government-level resources and support. As we’ve discussed here before, ransomware as a service is a large and growing threat to small and medium-sized businesses the country over. But, it’s not always nefarious actors who are deliberately targeting you that you have to worry about — … Read More

The ransomware protection checklist

ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a detailed report about the ransomware-du-jour, BlackMatter. Similar to other Ransomware-as-a-Service threat vectors (which we’ve written about before), it’s cheap and easy to deploy, utterly devastating to infected systems, and cause for real concern in the IT community. I wish this wasn’t such a tired story, but this is life in … Read More

How SIEM can protect your business from cyberattacks

SIEM

There really is no way to overstate the cyberthreat environment small and medium-sized businesses find themselves in today. Attacks are up across the board (and not just for large enterprises). The tools hackers are using are both more advanced and more pernicious… all while being more widely available. Now, this shouldn’t come as that big of a surprise to anyone … Read More

President Biden calls critical meeting to combat cyberattacks

cyberattacks

News of cyberattacks are no longer the exclusive purview of industry publications. They’re not even confined to the more niche tech publications like The Verge or Wired any more. No, cybersecurity (and the inevitable failures when they occur) is so integral to modern life, that when almost any breach occurs, it’s international news across medium and outlet. Even companies that … Read More

Phishing attempts (and success rate) through the roof in 2021

phishing

Phishing. It’s a tale as old as time (well, as old as email, anyway…). It’s been a persistent threat for decades, but is becoming more sophisticated, more successful and more insidious with every passing year. Yes, our understanding and expectations of being phished are rising… but so too are the skill, cunning and ruthlessness of the phishers. And so far … Read More

Ransomware-as-a-Service — the darker side of the Colonial Pipeline hack

Ransomware-as-a-service

It would have been pretty hard to miss the news of the Colonial Pipeline hack. We wrote about it here to advise our enterprise clients what they needed to know about, and what it meant for their collective futures. It got play in outlets the media world over, and for good reason — when the pipeline that feeds the entire … Read More

Colonial Pipeline hack — what your business needs to know

Colonial pipeline

About two weeks ago, one of the largest physical infrastructure cyberattacks perpetrated against the United States hit the Colonial Pipeline. That pipeline, responsible for nearly 50% of the East Coast’s fuel, had to be shut down for a significant period of time before the company capitulated and paid the ransom demand to regain access to their critical files. It was … Read More

How the news endangers your company’s security

News & cybersecurity

The news media catches a lot of heat for a lot of different reasons. Much of that is justified, some of it not so much. But regardless of where you fall on that particular ideological spectrum, if you own a business, the news can be a huge threat to your cybersecurity and IT reliability. Wait… what? I know, I know. … Read More

How OpenDXL Ontology could change your technology stack

OpenDXL Ontology

One of the most common subjects on this blog is cybersecurity. It’s by no means all we do as a managed IT provider; but, when your #1 goal is uninterrupted uptime for your clients, security breaches rank pretty high on the list of things we have to watch out for. It’s also the space within our industry that sees the … Read More

SIM swapping: what you need to know about this growing threat

SIM swapping

If you’re like most Americans, you probably don’t really interact with SIM cards all that much any more. Unless you’re traveling abroad and need to swap a SIM card out to connect to that foreign network, you might not even know where the SIM card is on your iPhone or Android device. But, that simple, tiny piece of plastic could … Read More