Category: Small & Medium Business Cybersecurity Management

DIY Dark Web monitoring danger represented by a hacker in a noodie hunched over a black computer in front of a glowing world map

5 Reasons Why You Can’t DIY Dark Web Monitoring

by Kevin Lancaster

Security awareness training , especially for phishing resistance, reduces cybersecurity incidents dramatically - if you maintain it properly. Here's how.

Read More
stolen data in the pot aty a dark web poker game represented by a computer keyboard with poker ships and cards on it.

Is Your Stolen Data in the Pot at a Poker Game?

by Kevin Lancaster

Cybercriminals are hungry for data like PII and password lists, because data is currency on the Dark Web, and used for everything from payments to poker games.

Read More
facts about cybercrime in 2020 represented by a vactor image of a hacker using a silver laptop top send icons of different styles of cybercrime around on a world map.

10 Essential Facts About Cybercrime in 2020

by Kevin Lancaster

These essential facts about cybercrime in 2020 are a must-read this Cybersecurity Awareness Month for 2021 cybersecurity planning!

Read More
ransomware protection presented as a hand with a key reaching from one laptop screen over another over a world flat map in red and white

CISA, NIST Ransomware Protection Guides Highlight Simple Solution

by Kevin Lancaster

Ransomware protection is more essential than ever. Guides from CISA & NIST point out the value of a simple solution.

Read More

Don’t Get Tricked by GDPR Compliance Phishing Scams

by Kevin Lancaster

Cybercriminals have been working overtime, especially in Britain, serving up fake GDPR compliance notices as part of clever GDPR compliance phishing scams. Here's how to avoid that trap.

Read More
IoT dangers represented by many device icomns connecting to a single person

Are You Including IoT Danger in your Cybersecurity Planning?

by Kevin Lancaster

Have you accounted for the additional risk that business and employee IoT devices bring to the table in your cybersecurity strategy? Here's how to guard against IoT danger.

Read More

TrickBot Hit With 1 – 2 Punch as Election Security Concern Grows

by Kevin Lancaster

Russian malware TrickBot got nailed in a preemptive strike by the Feds and Microsoft. Is this the future of election security?

Read More
security awareness training

Security Awareness Training Works – If You Maintain It

by Kevin Lancaster

Security awareness training , especially for phishing resistance, reduces cybersecurity incidents dramatically - if you maintain it properly. Here's how.

Read More
credential stuffing represented by a blue lock on a darker bluw background with semitransparent binary code in pale blue

Credential Stuffing Attacks Cause FBI Concern

by Kevin Lancaster

Credential stuffing attacks are ramping up, and the FBI points to a lack of multifactor authentication as a major cause for concern.

Read More
supply chain risk represented by a world map in blute digitized with pathways showing business relationships

10 Facts About Supply Chain Risk You Need to See

by Kevin Lancaster

You're paying attention to cybersecurity best practices but are your suppliers and service providers? Here's how to mitigate supply chain risk from sloppy third party cybersecurity dangers.

Read More