News

Governments Urge Detection Controls

Governments Urge Detection Controls

If you've known us for very long, you know that our security program is based on the broad lifecycle...

Penny Wise and Pound Foolish

Penny Wise and Pound Foolish

We've all heard the quote but do we really understand the deep meaning. In business, I'm sure many of...

Arkansas Data Breach Lawsuits

Arkansas Data Breach Lawsuits

We've seen a number of cybersecurity-related lawsuits filed here in Arkansas lately. We can judge these however we wish...

Text Phishing Bypass Tactic

Text Phishing Bypass Tactic

By now, you've probably seen the unpaid toll text message phish about 100 times or more....

Click to Fix Cyber Attacks

Click to Fix Cyber Attacks

In cybersecurity, we love giving silly names to cyber attacks... phishing, smishing, vishing, and what the heck is quishing?...

Small Business VPNs Continue to be Targets

Small Business VPNs Continue to be Targets

Attackers are upping their game against the brands of Firewall/VPN all-in-one devices prominently used by smaller businesses. They aren't...

The Regulators aren't the Enemy

The Regulators aren't the Enemy

We recently did a piece in Arkansas Business on the changing state of business regulations at...

Tax Season Scammers

Tax Season Scammers

Tax season in the U.S. brings a special set of threats. If you are filing a tax return, get...

Security Theater: Are You Reducing Risk or Putting on a Show?

Security Theater: Are You Reducing Risk or Putting on a Show?

We love the phrase "Security Theater." It's perfectly descriptive while also being pejorative. You may also hear us say...