The results are out from cybersecurity guru Fortinet’s 2021 Global Threat Landscape Report. And they are shocking: The...
When Chicken1 Should Not Be Your Password
The Chickens are Coming Home to Roost Sorry, not sorry. Look, ransomware and supply chain disruptions are...
Have You Completed Your IT Asset Inventory?
One foundational element of Zero Trust security is knowing what you have. You need an IT asset inventory. This...
Passwordless Authentication is Here! But You Knew That.
Today’s technology news stream has been abuzz with the news that you can now eliminate your password from your...
HR-related Phishing Scams Are on the Rise: Stay Alert!
Phishing scams related to COVID-19 were everywhere last year. Fortunately, those have dropped off significantly in...
Watch for These Emotional Triggers in Phishing Messages
I received a note last week from Marco Van den Berg, CIO of the International Rice Research Institute. Marco had read...
Protect Your Organization Against These Common Phishing Attacks
Phishing. Yeah, we get it. We're supposed to educate our users on phishing attacks and how to prevent them. Today I'm...
Tune Azure MFA to Balance Security and User Experience
It is useful to remember that you can overcome objections to change if you understand how that change makes people...
How to Respond to the Kaseya Ransomware Attack
By now you have no doubt heard about the Kaseya ransomware attack. And you want to know: does it affect my...
Mobile Security is a Bigger Threat than Ever
According to the security software specialists at CheckPoint, mobile security has become a huge problem over the past...
Know Your Enemy: The State of Ransomware in 2021
I recently came across a report from the security firm Sophos, describing the state of ransomware in 2021. Here is a...
Manage Cybersecurity for What It Is: A Risk Problem
I read a Forbes article today with an interesting message: manage cybersecurity the way you would manage risk. I could...
5 Security Strategies for the New Hybrid Workplace
Businesses have had to make massive adjustments to the way they function over the past year. And the pandemic has most...
3 New Advanced Phishing Attacks to Look Out For
My colleagues and I have written about various phishing techniques over the past couple of years, and the clues to...
Make Your Security Policies Work for You
Do your security policies work for you? Or do you have a love-hate relationship with them? As in, people love to hate...
Patch Your Exchange Server Now. But Don’t Stop There.
As luck would have it, I was putting together a proposal last week to help a non-profit. The organization was coming...
Say Goodbye to Passwords With Microsoft’s Zero Trust Strategy
Well, we’ve survived a year in a pandemic and we’ve had to adapt the way we work in significant ways. At the same...
Investigate and Remediate Threats with Zero Trust
Congratulations! We have made it to the top of our Zero Trust stack. Today I am going to cover the steps you can take...