The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by...
If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your...
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each...
Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them...