The LastPass Breach: 3 Steps You Need to Take Immediately [Podcast]
In August of 2022, LastPass announced that they had been the victim of a cyberattack. The hackers had penetrated their security and stolen some company information, including source code. But, they assured the world, no customer information had been accessed. Fast...
Eufy’s Blunder – Don’t Promise what You Don’t Provide [Podcast]
Eufy made a name for itself as a video baby monitor company that provided peace of mind - in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow. When you promise things like end-to-end,...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...
The Open SSL Vulnerability – What is it and What Can Be Done? [Podcast]
There are key systems that run the basic technology and internet services that we use every day. Many of them have been around, in some way shape or form, for decades. Even more recent versions tend to be based on open-source programming, or built on open-source code....
When is a Cyber War a Real War? [Podcast]
When your business, or a business you rely on, is the victim of a cyberattack, there is always a price that you pay simply for being the victim. There are emergency IT costs, data recovery costs, identity theft protection, investigations, lawsuits, and sometime even...