It's not us, it's you. We need to talk about marketing and how we should be presenting our products and services to newer practitioners in our space. For too long now, there's been this marketing trend of "100% protection." It's got to stop. The Truth About...
cybersecurity
Setup DNS over HTTPS on Windows 11!
Did you know that Windows 11 ships with built in support for DNS over HTTPS (DoH)? DoH is both a privacy and security enhancement that allows you to encrypt your DNS queries instead of send them in the clear over UDP. It uses HTTP/2 and HTTPS, and supports the wire...
Yes, Public WiFi is Still Insecure
So, on my phone, I use Microsoft Start as a news feed. I know, ANOTHER Microsoft product, Dom? Yes, maybe I have a problem, but I like how it customizes my feed. Anywho, that isn’t the point of this article. No, this article is about a news piece I read a couple of...
What Antivirus Should I use on my Home Computer?
As the “tech expert in the family,” I get this question a lot. I figured that I may as well answer it for whoever in my audience would listen. In this article, I’ll share my thoughts on what endpoint protect you should be running at home.First off, it’s worth noting...
FTC Announces Potential Legal Action for Failure to Patch Log4Shell, Future Vulns
Via The Record 5JAN22 - The Federal Trade Commission made an announcement on Tuesday that it may pursue legal punitive action against entities who experience a breach of consumer personal data as a result of failure to patch against Log4Shell and future ‘similar known...
The AirTag Conundrum: Apple Needs to Fix This!
AirTags are being used to stalk folks, and it needs to be fixed!
Is it Time to Let Go of Your RMM?
This question is quickly becoming the hottest question in the channel, especially after the Kaseya incident. In this article, I’ll illustrate a kill chain with an RMM-based attack, some thoughts on attack surface reduction, and some thoughts on ditching the RMM altogether.
Protect Yourself from BECs by Empowering Your Team
It's cliché by now:Your users are your best cyber defenders.I hear that and sometimes I feel it's getting old, but it's so very true. In this article, let's take a look at Business Email Compromises (BECs), and how we can empower our people to protect the business...