By Brett

Showing 10 of 29 Results

Warning: Apple AirTag and Tile Misuse

The popular, small, quarter-sized tracking devices are typically kept on items easily misplaced or lost such as keychains, purses, wallets, and luggage to name a few. However, because of their small profile, robust network and […]

The future of ransomware

Excerpt from Sophos 2022 Threat Report Ransomware has staked its claim as a major element of the cybercriminal ecosystem. As one of the mostpotentially damaging and costly types of malware attacks, ransomware remains the kind […]

Domain Registry Letter – JUNK!

If you received a letter that warns your domain name is going to expire, and wants you to register your domain with them – trash it! Unfortunately, if you did not purchase domain privacy protection […]

Unstoppable Mobile Malware

Excerpt from Sophos 2022 Threat Report Windows computers are not the only targets for cybercriminals. Malware also targets the Android and,to a lesser extent, the iOS platform for mobile devices. As our portable and handheld […]

Cybersecurity Checklist

Did you know? 1 in 5 small businesses will suffer a breach this year 81% of breaches happen to small and medium sized businesses 97% of breaches were preventable Perform a Security Assessment The first […]

May 6th – World P@33W0r#d Day

In honor of World Password Day, I’m going to share the shocking statistics about risky password practices (or more like lack of practice), and steps to keep you safe. 91% of people know that using […]

The Need For Managed Threat Response (MTR)

The most devastating cyberthreats generally involve human-led attacks, often exploiting legitimate tools and processes such as PowerShell. However, attackers are evolving, resulting in an increase of successful breaches and attacks. Take a look to see […]

Sophos Endpoint Detection & Response (EDR)

Today’s EDR are used with endpoint security for increased detection, investigation, and response capabilities. However, many EDR solutions lack value to businesses because they are difficult to use, lack sufficient protection, and are resource intensive. […]