Risks

Learn about Risks on our blog

Building Trust

There is an Indian proverb: "Trust grows at the rate of the coconut tree and falls with the speed of the coconut." When meeting for the first time with prospective customers, I always start out by asking them about their business. What's the key things that help them...

read more

Latest in Phone Scams

As a pretty security savvy IT person, "Yours Truly" was almost stung this morning. I answered an incoming cell call from an Ontario phone number. Very quickly, a recorded message began with a North American digitized voice in perfect English telling me that I had 2...

read more

May the Force Be With You

Star Wars fans recognize this greeting and celebrate it every May 4th. A post-incident assessment of Rogue One's breach of the Galactic Empire's datastore on the planet Scarif was recently conducted. It found a number of critical cyber weaknesses in Imperial Security....

read more

Do Our Patching Cycles Need to Change?

Best practice has been to patch systems--both operating systems and applications--every 28-30 days (a month). Some don't even do it this often (as shown by the recent Microsoft Exchange hack). This cycle is based on the practice that Microsoft and other vendors...

read more

The Microsoft Exchange Hack Explained…

In January, a state-sponsored hacking group from China known as "Hafnium" discovered 4 "zero-day exploits" in Microsoft's Email Server software called "Microsoft Exchange." You may have heard about this in the news, and you are probably asking whether you should be...

read more