AirTags are being used to stalk folks, and it needs to be fixed!
Category: Cybersecurity
Cybersecurity in 2022: Don’t do it alone!
It goes without saying that the cybersecurity landscape is changing... rapidly. We're seeing a huge rise in attacks like ransomware, phishing, extortion, and more. More to the point, we're seeing a huge rise in these attacks amongst the small to medium business...
Is Your “Patch Management” Doing More Harm Than Good?
Patch management is becoming a more debated topic nowadays. The proliferation of Intune's simplified patch management across Windows environments has upset some. and made others (like me) quite pleased. Let's talk...Patch Management: Circa 2014Let's talk about how we...
Modern Work Security Tip: VPN
VPNs can be a critical tool in protecting users and data when they use untrusted networks, such as public Wi-Fi.
Cyber Insurance is Getting Harder to Acquire for SMBs… Sort of
There’s been a significant amount of chatter around Cybersecurity Insurance for SMBs. Insurance carriers and underwriters are ratcheting up requirements for getting a policy, and the attestations are getting more and more intense. Of course, this makes things harder...
Is it Time to Let Go of Your RMM?
This question is quickly becoming the hottest question in the channel, especially after the Kaseya incident. In this article, I’ll illustrate a kill chain with an RMM-based attack, some thoughts on attack surface reduction, and some thoughts on ditching the RMM altogether.
Managing Device Health in the Modern Workplace: Why it Matters
The Microsoft three-legged stool model. When I talk about security in the Modern Workplace, I very often use the "three-legged stool"I'm a fan of this model because it's easy to explain, and the different legs in the stool can easily be attached to pretty much any...
Protect Yourself from BECs by Empowering Your Team
It's cliché by now:Your users are your best cyber defenders.I hear that and sometimes I feel it's getting old, but it's so very true. In this article, let's take a look at Business Email Compromises (BECs), and how we can empower our people to protect the business...