The LastPass Breach: 3 Steps You Need to Take Immediately [Podcast]
In August of 2022, LastPass announced that they had been the victim of a cyberattack. The hackers had penetrated their security and stolen some company information, including source code. But, they assured the world, no customer information had been accessed. Fast...
What is Zero Trust Cybersecurity and How Much Does it Cost? [Podcast]
Zero Trust is one of the most popular phrases thrown about by cybersecurity professionals and - more importantly - thrown into cybersecurity sales pitches these days. It's obviously important, and it's obviously something you want. But what is it? Is it really...
Why Cyber Resilience is the Best Metric for Cybersecurity [Podcast]
There are a lot of ways to measure the impact - and relative success - of a cybersecurity program. There are tests you can run to determine how effectively your employees are adopting defenses to phishing emails. There are table-top exercises to determine your ability...
What is a DDoS Cyberattack? [Podcast]
The best way to make sure that you and your business are protected from cyberattacks is to employ a broad-focus cybersecurity strategy. In order to do so, you need to have a basic understanding of the threats your business faces from cybercriminals, hacktivists, and...
How Implementing Least Privilege will Protect Your Business [Podcast]
The more access users have to your company's data, the more vulnerable that data is in the event of a data breach. A malicious actor gaining access to one of your employee's credentials gives them access to everything that employee is allowed to see. That's why you...
Eufy’s Blunder – Don’t Promise what You Don’t Provide [Podcast]
Eufy made a name for itself as a video baby monitor company that provided peace of mind - in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow. When you promise things like end-to-end,...
Disaster Recovery: Forming Your Disaster Response Team
If it seems like each step in preparing your Disaster Recovery Plan is the most important step, even more important than the one that came before it, I can’t blame you. That said, we’ve come to another really important step – creating your Disaster Response Team (the...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...
The Open SSL Vulnerability – What is it and What Can Be Done? [Podcast]
There are key systems that run the basic technology and internet services that we use every day. Many of them have been around, in some way shape or form, for decades. Even more recent versions tend to be based on open-source programming, or built on open-source code....
Disaster Recovery: Performing a Disaster Risk Assessment
The first step in creating an effective plan to protect your business from potential disaster is to establish an understanding of your actual risks. Given the many types of disasters that could cause your business to cease operations, and the different ways you will...