Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals   Many Cybersecurity professionals love a challenge.  They do not enjoy the doldrums of make work security.  They long for excitement and challenging work. They are in demand so it is not suprising...
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer

It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer

It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer   There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...