We’re continuing in our series of blog posts that cover some of the most common questions I get asked about cybersecurity. Here are the last few weeks of questions in…
People often ask me questions about cybersecurity. Over the next several weeks I’m going to share some of these questions here. Q: What should I look for when shopping for…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…
The following is adapted from Fire Doesn’t Innovate. Ransomware is one of the nastiest types of cyberattacks. When ransomware infects your computer, its first directive is to encrypt all of…
The following is adapted from Fire Doesn’t Innovate. We all know people whose definition of password security is writing their password on a Post-It Note and slapping it on the…

The following is adapted from Fire Doesn’t Innovate. Two-factor authentication has become more important as the level of cyberattacks continues to rise. Every time a company you do business with…

The following is adapted from Fire Doesn’t Innovate. For as long as people have had possessions, other people have tried to steal them. Up until recently, if someone wanted to…
The following is adapted from Fire Doesn’t Innovate. The Internet is becoming increasingly dangerous for all Americans due to the activities of organized crime and foreign nation-states. The US government…
The following is adapted from Fire Doesn’t Innovate. It seems like every day we hear news of a well-known company experiencing a data breach. Companies like Yahoo, Target, and Marriott…

Question: Last week, you pointed out that not using local admin accounts for routine computing tasks (e.g., web browsing and emails) was a powerful cyber hygiene practice. I’ve heard that’s…