Similar Posts
What is a Shared Responsibility Model?
ByadminIf you don’t know what this is and don’t have it documented for each of your external and cloud providers, the first step is to listen to this post. The second step may be to contact us for assistance. Ignoring it is not an option that will turn out well. It leads to outages and…
Risks Around Open Source Software
ByadminEveryone uses it. Including me. But free doesn’t mean bug free and it also doesn’t mean malware free, as Amazon recently learned. Learn more.
Do You Know What a Quishing Attack is? Hackers Do!
ByadminQuishing is the act of using malicious QR codes to launch a cyber attack and, apparently, it is very popular. So popular the FBI and the FTC are sending out alerts. Why is it popular? Listen and find out.
Old Attacks Never Die – USB Malware Spreader
ByadminIn this case, it wasn’t the well known “candy drop” attack but rather an accidental USB attack. Still infected an entire hospital. This one is attributed to China. Learn more below.
Draft Kings Attack Recommendations
ByadminSome users of the sports betting site Draft Kings discovered that they were locked out of their betting account and, more importantly, their bank accounts were drained. Learn how this happened and what you can do to minimize this risk. Note that this is attack is not limited to Draft Kings or sports book sites….
MFA Fatigue – What is it and How to Protect Yourself
ByadminMFA Fatigue is a relatively new attack method and is a way to try and get around MFA security. Learn what it is and how to protect yourself and your company against it, here. Audio Video