What to know about new malware if your company runs on Mac

Mac lovers have touted multiple advantages over Windows-based machines for years. These claims haven’t always been substantiated by real data, sure… but folks love Apple computers and have for a while now. One of the advantages claimed for years and years is that Macs are less vulnerable to hacking, ransomware, malware, etc. While that may have been true a decade … Read More

How the news endangers your company’s security

News & cybersecurity

The news media catches a lot of heat for a lot of different reasons. Much of that is justified, some of it not so much. But regardless of where you fall on that particular ideological spectrum, if you own a business, the news can be a huge threat to your cybersecurity and IT reliability. Wait… what? I know, I know. … Read More

7 New Year’s resolutions to keep your company’s data safe

In our first post of 2019, we laid out 4 areas of cybersecurity threats to watch out for in 2019; but telling you about threats isn’t enough to help you combat the malicious actors out there, so we also promised some New Year’s resolutions to help. So, here you are: 7 resolutions to help keep you digitally safe in 2019: … Read More

4 cybersecurity threats to watch out for in 2019

2019 hacking threats

2018 saw a glut of cybersecurity disasters at some of the highest levels of industry and government. From the ~$10 billion NotPetya debacle to Marriott’s 500-million-guest-record theft (which actually started in 2014 and lasted 4 full years, to be fair), it was a banner year for digital criminals. This dangerous environment has cybersecurity as a top item on a lot of … Read More

Is voice hacking the next line of attack for threat agents?

voice hacking

It’s a brave new technological world out there, and it seems to reinvent itself every couple of years. What was inconceivable only a few years ago goes from Hollywood fantasy to ubiquity in the proverbial blink of an eye. Virtual assistants like Iron Man’s J.A.R.V.I.S. leapt off the screen and into our homes via Alexa and Google Home. James Bond … Read More

Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More