Coming to Life: A Detailed Tutorial on Building Your First ATT&CK Procedure

Note: The attack procedure built in this post will not work for every macOS operating system or in every scenario. There are many factors that can block scripts from running at boot time, and you should always test against your target operating system…. Continue reading Coming to Life: A Detailed Tutorial on Building Your First ATT&CK Procedure

How Joining a Professional Community Can Supercharge Your Career and More

When I was a software developer, I never joined any dev communities. I didn’t see the point. I also worked evenings as a professional musician and mostly spent time within the music community and sports groups I was a part of. I spent time with my dev … Continue reading How Joining a Professional Community Can Supercharge Your Career and More

Scams Starting on Social Media and Targeting Your Business

Social media is no stranger to scams. However, recent trends show scammers have started to show more aggression toward businesses since the beginning of the pandemic. Being able to recognize these scams can help you prevent injury to your business. Soc… Continue reading Scams Starting on Social Media and Targeting Your Business

REvil, Ryuk and Tycoon Ransomware: How They Work and How to Defend Against Them

It is the Tuesday morning after a long weekend. You come into work early to get caught up on emails only to find you are completely locked out. You have been hit by a ransomware attack. You ask yourself, “What happened? And how do I fix it?” This post … Continue reading REvil, Ryuk and Tycoon Ransomware: How They Work and How to Defend Against Them

Malicious Actors Reserving Their Cyber Attacks for the Hospitality Industry

Cyber attacks that lead to data breaches are becoming increasingly common in all industries, but there are certain types of businesses that are more vulnerable than others. The hospitality industry in particular is one of the most likely industries to … Continue reading Malicious Actors Reserving Their Cyber Attacks for the Hospitality Industry

What Data Privacy Day 2021 Means for Individuals

Data Privacy Day (DPD) is January 28. Sounds exciting, right? I’m sure you’ve got the pinata stuffed and the presents on the way. What is DPD about? It’s all about me! We generally don’t like to use this phrase. It’s considered selfish and arrogant, le… Continue reading What Data Privacy Day 2021 Means for Individuals

What Does Data Privacy Mean to Consumers and Corporations?

January 28 is Data Privacy Day (DPD)! I know, you’re so excited that you’ve got a party planned to get your executives, Marketing and Sales personnel to spend all day reviewing and revising your Privacy Policy (especially now that Privacy Shield is inv… Continue reading What Does Data Privacy Mean to Consumers and Corporations?

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles tha… Continue reading A Look at the Legal Consequence of a Cyber Attack

NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency

In the digital age, organizations and the missions and business processes they support rely on information technology and information systems to achieve their mission and business objectives. Not only is technology used to efficiently enable businesses… Continue reading NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency

The Changing Dynamics of Cyber Insurance

Almost exactly a year ago, cybersecurity professionals were locked in a heated debate about insurance. While some were keen to point out that the future of the industry would need to include some form of insurance market, others argued that cyber insur… Continue reading The Changing Dynamics of Cyber Insurance