“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel

“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel

“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel Yes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft’s popular spreadsheet package, Excel, so that it...
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Our Personal and Brand Reputations are At-Risk By Nation-States

Our Personal and Brand Reputations are At-Risk By Nation-States

Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that.   With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration.    However, it must get set up correctly if you want to...
Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks.  In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses

Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses

Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses New and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities.  This deep pocket targets are driving the costs up by...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality

Regulatory Compliance: The Perception and The Reality Regulatory compliance.  We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight.  Why? It is complicated and expensive and they...