What Hackers Are After...Your Personal Data

Listen as Michael Chertoff Explains What Hackers Are After - Your Personal Data, in this 4 Minute Video. “Your data is the oil of today”... WSJ… A quick review of Michael Chertoff’s book on…


When Your Email Gets Hacked - The Hacker Can Really Do Some Damage

I’ve heard security experts say, 99% of your intellectual capital is in digital form somewhere in your company...50% of it is in email...That’s scary because most email is not secure.  When someone…


Here’s Your Small/Medium Business CyberSecurity Checklist...

While companies are losing data every day, many of the crimes and mishaps you read about in the paper could have been avoided if company leaders spent just a little more  time watching their data…


Security Breaches Often Lead to Job Loss and Business Failure! Can Your Firm Stop Cyber-attacks Before They Destroy Your Career?

In North America 32 percent of data breaches have resulted in a C-level manager, president or CEO losing their job, according to new research. 42% of companies world-wide report they’ve encountered…


It’s a Matter of When, Not If...Cyber Security Issues Are Getting Bigger

“Experts have put cyber threats at the top of their risk list since 2013, and this year, the DTCC concluded that it’s a matter of “when,” not “if,” regarding the likelihood of a successful…


Most Hacker Attacks Don’t Involve Bad Links! You’ll Be Amazed At How The Ruse Begins

All email based attacks involve some sort of social engineering ruse...meaning the attacker starts by tricking you somehow...however, the common misconception is, the attack requires clicking a…


Are Hackers Selling Access to Your Computer?

The going rate is just $10... One common misconception is, someone has to hack into your computer to gain access to it... But the truth is, hackers are selling access to computers compromised long…


Can Companies Really Keep Hackers Out?

Detection/Response - this is what I’ve been saying...between internal breaches and outsiders getting in through vehicles like email, you can’t just keep the bad guys out...Companies with this…


One Tool That Usually Works For the Hacker - And Some Advice if You Want to Keep Your Data!

Hackers use one tool more than anything else - and it usually works. The general term is Social Engineering - the form it often takes is called Phishing. Why does it work? Because we all have jobs to…


Is the Cloud Secure? What About Your Other Connections?

What about your HVAC, your accountant, your legal advisor, your supplier...or anyone else you're connected to... The more your business moves to cloud, or connects with third party suppliers and…