Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world.  Even the most prepared organization have found themselves...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Our Personal and Brand Reputations are At-Risk By Nation-States

Our Personal and Brand Reputations are At-Risk By Nation-States

Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that.   With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring?  Did you do your due diligence?  I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince.    ...