by Mike Foster | Aug 15, 2025 | ACH Fraud, BEC, Business Email Compromise, Cyber Fraud, Cyber Security, Cybersecurity, Email Security, IT Best Practices, Wire Transfer Fraud
EXECUTIVE SUMMARY New Business Email Compromise (BEC) attacks targeting wire transfers cost organizations billions annually. Threat actors have developed new techniques to bypass even sophisticated email protection filters in organizations like yours and can...
by Mike Foster | Jun 4, 2025 | Alerts, Best Practices, Cloud Security, Cyber Security, Cybersecurity, IT Best Practices, IT Pro Tips, IT Security, IT Settings, Microsoft Settings
Your employees might be one click away from exposing all sensitive data. Here’s how to stop it. We’re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their...
by Mike Foster | May 20, 2025 | AI, Executive Tips, Executives and IT, Privacy
From now on, if you want to write something you expect to stay private, it’s a good idea to use a pen and paper or something other than your computer. What you say in online meetings can now be transcribed, stored, and retrieved. Even more concerning, anything...
by Mike Foster | May 20, 2025 | AI, IT Risk Management, Privacy, Uncategorized
In addition to the typically included clauses in your AI usage policy, such as data privacy requirements, acceptable use guidelines, and compliance with privacy regulations like GDPR or CCPA, some overlook essential clauses. See below to determine if you want to add...