Resources

Are your old userids opening the door to Cyber attackers?

We have all heard the phrase “A chain is only as strong as its weakest link”. When it comes to Cyber Security that phrase is all too true. Sometimes a Cyber Attack comes in via something that appears small (like a user clicking on an email link). Sometimes that small thing is an unused userid that […]

Read more

Tech Tidbit – I am proud of you

Late in the afternoon on a Friday, I created a bit of a scare for those of you who are part of our Paladin Sentinel monitoring system.  I was doing my due diligence removing a monitoring policy we experimented with after our last major system upgrade, but didn’t provide any value to us or you.

Read more

Tech Tidbit – Let’s Talk About Security – We Will Come To You!

We have recently been approached by many school districts to talk to their district office staff and in some instances their faculty about phishing and security as it relates to money and personally identifiable information (PII).  These have been in the form of either special in-service training for district office/business office staff or as part […]

Read more

Tech Tidbit – Ransomware is getting a whole lot nastier

We all understand the scourge of Ransomware.   It is debilitating.   Even in the best case, it consumes a huge amount of time to recover.  However, now the bad guys are getting even more nasty.   They want their money.   If you decide you can recover or don’t care, they get nothing.

Read more

Tech Tidbit – You don’t have to be faster than the bear….

  “You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you.” ― Jim Butcher Recently we had the former White House Chief Information Security Officer (CISO) on our webinar talking about the Ukrainian war and its impact on us.

Read more

Tech Tidbit – Online Credential Theft

I was watching a panelist discussion post-mortem discussing firsthand knowledge of 25 major ransomware-style breaches. One of the panelists was an award-winning, ex-NSA offensive hacker.  One item that was stressed as a common theme across many breaches was credential theft being the number one way bad people get into the network.

Read more