“Legends state that Achilles was invulnerable in all of his body except for one heel because when his mother Thetis dipped him in the River Styx as an infant, she held him by one of his heels. Alluding to these legends, the term “Achilles’ heel” has come to mean a point of weakness, especially in […]
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
Your techs *should not* be local admins anymore. It is simply too dangerous. I have personally been a limited user on all my laptops, VMs and desktops for three years. I am living a happy life. It is time to completely eliminate this concept of “Techs are Local Admins”. It is simply too dangerous […]
We have to plan to safely ride out storms and other unforseen events I am fresh off another weekend of power issues with the big storm. It was another object lesson that it is imperative to actually test disaster recovery strategies.
“War, huh, yeah What is it good for? Absolutely nothing, uh-huh, uh-huh” -War by Edwin Starr The world is all looking in horror at the events unfolding in Ukraine. Our thoughts and prayers are with the people of Ukraine under siege.
How I manage the storm of information and how you can quickly know what I think is important. A few thoughts on how I manage the myriad of technical information I read through and how you can get plugged in real-time to what I think is important.
Today’s NIST Topic is – “Implement a Security Awareness and Training Program” This is something very near and dear to Bob’s and my heart. We talk on this and write on this and plead on this. Security awareness and training is one of those areas where we are never done and always continually trying […]
“Mind the Gap” As the war unfolds and these “Hacktivist” Guerillas take their shots at both sides of the fight, the details of Russia’s brutal cyberwarfare campaign continue to come to light. It appears Russia’s cyber warriors are using something called “Hermetic Wiper” in their attacks.
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.
Surge protectors need to be banned from your wiring closets Hi Lisa, A few thoughts on UPSes and Surge Protectors. If you need help with getting your arms around your power plug requirements in your closets, give us a call. -Scott Quimby