by Dan Siebert | Aug 26, 2021 | Security
The Problem: Where Will the Next Attack Strike? Your business processes consist of multiple layers supported by your IT environment, each of which can be targeted by advanced cybercriminal tactics. These layers include: Your internet use Your network Your employees...
by Dan Siebert | Jul 8, 2021 | Security, Technology
Printnightmare has kept IT and systems staff alerted for the past week. It was originally attributed to: An accidental leak Leaking the details for this vulnerability happened by accident, out of a confusion with another issue, CVE-2021-1675, also impacting Print...
by Dan Siebert | Jun 10, 2021 | Clouds, Data Backup and restore, IT Blueprint, Password Manager, Security, Technology, Training
Phishing remains the primary cybersecurity threat to businesses and individuals using networked devices. It serves as a gateway for criminal enterprises, exploiting techniques often used by legitimate applications, which complicates detection. To combat this,...
by Dan Siebert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology
One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out. Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines. There is more than knowledge...
by Dan Siebert | Feb 13, 2021 | Password Manager, Security
If you use the same password for multiple systems—online shopping, email, your company’s cloud bookkeeping solution, etc.—you are not alone. The best password is unique, yet even Facebook founder Mark Zuckerburg did that. And in 2016 his LinkedIn credentials were...