Similar Posts
Dark Patterns
ByadminEver try to cancel a subscription online? Or even figure out when the subscription is due to be renewed? That difficulty is intentional and is now against the law in many states and countries. If you operate an online presence, it is important for you to understand what you are allowed to do and what…
What is Required for CMMC Level 1 Compliance?
ByadminOver the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
Impact of Cybersecurity on Mergers and Acquisitions
ByadminWe often get asked about how a seller’s cybersecurity practices impact business valuation and related to that, how a lack of cybersecurity due diligence on the part of the buyer impacts overall risk. Here are two very public examples of that; one favorable to the buyer, the other favorable to the seller. If you are…
Old Attacks Never Die – USB Malware Spreader
ByadminIn this case, it wasn’t the well known “candy drop” attack but rather an accidental USB attack. Still infected an entire hospital. This one is attributed to China. Learn more below.
The Risk of BYOD – Non-Managed Devices
ByadminMany companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…
Banking Social Engineering Scams are Alive and Well
ByadminThe easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…