Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds...
Recently, the CEO of an organization told me that his budgeting process demonstrates his commitment to protecting from cyber-attacks because he includes his investments in the IT Vital Systems Reviews as part of his risk management budget. You might already do this...
What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to...
An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they’ve...