issues
BEC…The Silent KillerBusiness Email Compromise (BEC)…sounds like something you might learn about in business school. Sounds almost boring. However, in reality, it is one of the main sources of online fraud, even topping ransomware.BEC doesn’t have that ominou…
Lincoln College to Close after 157 Years Following Cyber AttackHistory is a wonderful teacher. We learn from experiences. Often we learn more from misfortune and hardships than we do from the smooth and steady times.Lincoln College, a historically black colle…
We Have Enough Security…Why Do We Need More?You can never have too much security, can you?Definitely, you can have too little.Often people will tell us that they have anti-virus or a firewall, so they are fine. This is wrong for two reasons.First, anti-virus …
On the Road AgainThis week we have had the opportunity to do what we love most…hit the road and meet with clients in person. We thought we would share our insights with you.First, no two organizations are exactly alike. Even when we meet with two county gover…
Debunking the Myths of Cyber SecurityMany organizations believe that cyber security is an option. Maybe even a luxury. In some cases, they may make excuses for why they think they don’t need it. One of the main barriers may be the lack of understanding. Whate…
Why Is Security Training So Important?Although this is a question that elicits a qualitative answer, I will attempt to provide a quantitative response.11 seconds – the average time between ransomware attacks34% - number of local government organizations that …
Half of All Local Governments May Be Attacked Daily60% of all small businesses that are hit by a cyber attack will go out of business within six months. If that happens, the people that work there will lose their jobs, and the owners will lose money. The empl…
Aren’t My Anti-Virus and Firewall Enough?We often hear from folks that they already have cyber security because they have anti-virus or a firewall. They feel like that is enough to protect them from cyber attacks. However, this is a false sense of security. H…
The Feds are Stepping Up to Protect Local Governments. Are you ready?
This week, President Biden signed the Strengthening American Cybersecurity Act. It sounds like a great idea to “strengthen American cyber security”. But how exactly are we going to do that?The quickest and easiest way to improve cyber security across the coun…
Be Alert to All Threats While the world watches Russia invade Ukraine, those of us in the cyber security arena has been on high alert for cyber attacks from Russia. However, we must not forget that many bad actors will take advantage of a crisis to attack whe…
Love on the Dark WebDon’t get too excited. What we are talking about is that “I love you” is one of the top 20 passwords on the Dark Web. These are the passwords that have been found most often in data breaches that are for sale on the Dark Web. Clearly, we h…
Much to no one’s surprise, Russia has indeed launched attacks on Ukraine. We knew it was coming.Earlier this week, on the eve of the tanks rolling across the borders, computer networks in Ukraine were targeted by a “data wiping” attack. However, this is actua…
Russia-Ukraine War and What Does it Have to Do With Cyber Security?As the world watches Russian troops amass along the Ukraine border, Ukraine, the US, and other countries prepare to defend against a kinetic war. However, since this is 2022, warfare can and m…
A recent survey by the Center for Digital Government showed that the top priority for city and county CIO’s is Cyber Security, even ranking higher than Broadband & Connectivity and Citizen Engagement.While I am pleased to know that most local CIO’s are fo…
When you receive an email from someone you know or an organization with whom you have been doing business, your defenses are usually down. You have known this person for a long time or you have been dealing with that company for years. Maybe it is a brand tha…
I am what some might call a cybervangelist. I am always warning people about cyber scams. Whether through phishing (emails), smishing (text messages) or vishing (voice).Last week I received a call that looked like it came from Louisville Gas & Electric (L…
The landmark $1.2 Trillion Infrastructure Investment and Jobs Act that was signed into law has several very important elements for state and local officials.READ MORE >>>
So What is Log4j and Why Should I Care?I’ve determined the last name of the cyber criminals. It’s Scrooge. Or maybe it’s Grinch.Either way, obviously cyber criminals hate Christmas. Once again, right before the holidays we were alerted of the latest, and poss…
New Mexico County Hit by Ransomware Attack – Happy Effing New Year!No rest for the weary. Just 5 days into the new year, the most populous county in New Mexico was taken down by a ransomware attack in the early morning hours of January 5, 2022.Bernalillo Coun…