News

sensitive data storage

Extortionware is the New Ransomware

You'll hear the term ransomware thrown around probably until the heat death of the universe. However, attackers aren't so...

phishing attempt detecting on laptop

Be Skeptical: Avoid Phishing Attack Success

Phishing attacks are becoming more popular because they are becoming more successful. We typically refer to these attacks as...

University of Mississippi Medical Center

Ransomware Attacks Targeting Healthcare & Small Businesses

Less than two weeks ago most of the University of Mississippi Medical Center shut down due to a ransomware...

making decisions

Protecting Human Decisions

In an extension of our previous article on cyber resiliency, let's talk a bit about protecting human decisions as...

password written on paper next to computer

Near Identical Password Reuse

If you've taken enough Security Awareness Training from us, you've no doubt heard about password reuse. If not, password...

bad ai-generated image

More AI Pitfalls

There are two areas that have become particularly problematic in the use of Generative AI (GenAI) and Large Language...

fireworks celebrating new year

New Year, New Focus?

Nah. The tried and true is still the best for smaller businesses. 2025 wanted us to chase all the...

exhausted worker

The Economic Cost of AI Workslop

Chris Wright, our firm’s co-founder, recently shared his thoughts on the rise of AI workslop with Talk Business &...

How to Stay Secure Amidst FCC Cyber Protection Rollbacks

How to Stay Secure Amidst FCC Cyber Protection Rollbacks

The latest move in the US government peeling back cyber protections is from the FCC. Telecommunications companies (telcos) complained...

visibility

Stop Relying on Luck: The Case for Visibility in Cybersecurity

When I talk to many prospective clients, the conversation starts out almost completely focused on preventing cyber attacks. There's...

Chris Wright interview on KATV

How To Avoid Scams and Keep Your Information Safe This Holiday Season

With social engineering attacks, cybercriminals often exploit our emotions, noting when we’re most distracted and vulnerable. These tactics are...

B-17 during World War II

Resilience by Design: Why Uptime Starts with Planning

In World War II, the B-17 flew many of the daylight bombing missions in enemy airspace. These were the...

handcuffs on laptop

Cybercrime Crackdown: Governments Worldwide Turn the Tide on Hackers

Law enforcement around the world continues to increase the number of cyber attacker take-downs.

We don't always see these because...

ai chat on laptop at work

When, Where & Why (or Why Not) to Use AI in the Workplace

Chances are that you’ve considered implementing artificial intelligence (AI) in your workplace processes. But when, where, and why (or...

Chris Wright on KARK for Cybersecurity Awareness Month

Length > Complexity: Longer, Memorable Passwords are Better for Security

Today, perhaps more than ever, passwords are omnipresent. But are we using the “right” ones to keep our devices...