Similar Posts
Will You be the Last to Know?
External attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
Banking Social Engineering Scams are Alive and Well
The easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…
The Risk-Reward Tradeoffs of GPT AI
Everyone is using AI and tools like ChatGPT have become super popular virtually overnight. But have you considered the risks associated with using these tools, have you created policies for your employees, do you understand how your vendors may be adding risk to your business and are you managing that risk? Learn more here.
Technical Debt
Are you managing your technical debt? Do you even understand what technical debt is? Does your management and Board (if there is one) understand that unaddressed technical debt is like a bottle of nitroglycerin just waiting to be jarred in the wrong way. And we just saw a massive example (as in their technical debt…
Protecting Website Security Question Answers
In light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
What is a Shared Responsibility Model?
If you don’t know what this is and don’t have it documented for each of your external and cloud providers, the first step is to listen to this post. The second step may be to contact us for assistance. Ignoring it is not an option that will turn out well. It leads to outages and…