Bomb’s will not be Iran’s retaliation – Technological hacks are more likely

Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​ Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat   It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android   Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...
The hanging of an MSP “Shingle” and Your Business Security

The hanging of an MSP “Shingle” and Your Business Security

The hanging of an MSP “Shingle” and Your Business Security   Are you in the cross hairs of hackers? How can a hacker multiply his efforts? By attacking a company who protects other companies.  Hackers new targets are the Managed Services providers (MSPs) because...
New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections   Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...