News

Text Phishing Bypass Tactic

Text Phishing Bypass Tactic

By now, you've probably seen the unpaid toll text message phish about 100 times or more....

Click to Fix Cyber Attacks

Click to Fix Cyber Attacks

In cybersecurity, we love giving silly names to cyber attacks... phishing, smishing, vishing, and what the heck is quishing?...

Small Business VPNs Continue to be Targets

Small Business VPNs Continue to be Targets

Attackers are upping their game against the brands of Firewall/VPN all-in-one devices prominently used by smaller businesses. They aren't...

The Regulators aren't the Enemy

The Regulators aren't the Enemy

We recently did a piece in Arkansas Business on the changing state of business regulations at...

Tax Season Scammers

Tax Season Scammers

Tax season in the U.S. brings a special set of threats. If you are filing a tax return, get...

Security Theater: Are You Reducing Risk or Putting on a Show?

Security Theater: Are You Reducing Risk or Putting on a Show?

We love the phrase "Security Theater." It's perfectly descriptive while also being pejorative. You may also hear us say...

AI Security Predictions for 2025

AI Security Predictions for 2025

We aren't usually ones for these "HOT TRENDS IN 2025" type stories, but occasionally there are ones with good...

Proposed New HIPAA Rules Announced

Proposed New HIPAA Rules Announced

HHS published a Notice of Proposed Rule Making on December 27th, 2024, that included extensive new...

 Security Vulnerabilities from End-of-Life Software

Security Vulnerabilities from End-of-Life Software

Since we've been working with smaller businesses, we've gotten far too many requests or statements about continuing to use...