Similar Posts
Dark Patterns
Ever try to cancel a subscription online? Or even figure out when the subscription is due to be renewed? That difficulty is intentional and is now against the law in many states and countries. If you operate an online presence, it is important for you to understand what you are allowed to do and what…
Cryptocurrency is Ripe for Cyberattacks
Cryptocurrency is basically a very sophisticated IT infrastructure. One that is not regulated very much and one which can have devastating financial impact to people if it is compromised. And it is being compromised daily. Don’t bring a spoon to a fork fight – learn what some of the risks are so you can better…
The Risk of BYOD – Non-Managed Devices
Many companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…
What is Required for CMMC Level 1 Compliance?
Over the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
Google Adds Android Privacy Feature
We all know that the big platforms track absolutely everything that we do. Now Google has added a feature to Android to reduce that tracking but I dare you to find it. The feature is not a magic fix but still a good tool. If you want to reduce Google’s tracking of you, you should…
Impact of Cybersecurity on Mergers and Acquisitions
We often get asked about how a seller’s cybersecurity practices impact business valuation and related to that, how a lack of cybersecurity due diligence on the part of the buyer impacts overall risk. Here are two very public examples of that; one favorable to the buyer, the other favorable to the seller. If you are…