People often ask me questions about cybersecurity. Over the next several weeks I’m going to share some of these questions here. Q: What should I look for when shopping for…
In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the illegal activity run sophisticated online companies. Today, let’s begin talking about how to defend your…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…
Last week I introduced you to the Millennial Mobster and talked about The Internet Age of Criminals. I explained that the typical hacker is not who our media portrays in…
The following is adapted from Fire Doesn’t Innovate. Ransomware is one of the nastiest types of cyberattacks. When ransomware infects your computer, its first directive is to encrypt all of…
The following is adapted from Fire Doesn’t Innovate. We all know people whose definition of password security is writing their password on a Post-It Note and slapping it on the…

The following is adapted from Fire Doesn’t Innovate. Two-factor authentication has become more important as the level of cyberattacks continues to rise. Every time a company you do business with…

The following is adapted from Fire Doesn’t Innovate. For all the ways it’s made our lives better, the Internet has a dark side inhabited by people like the Russian cybercriminal…

The following is adapted from Fire Doesn’t Innovate. For as long as people have had possessions, other people have tried to steal them. Up until recently, if someone wanted to…
The following is adapted from Fire Doesn’t Innovate. The rising tide of cyberattacks on businesses demands that every organization – from the small town dentist office to the multinational bank…