Entries by D9

,

Don’t Borrow Trouble

We remember a wise man once saying to us, “Never trouble trouble, till trouble troubles you.” We thought of that during a conversation with a prospect the other day. He asked if we thought adding cybersecurity protection — and buying the cyber liability insurance for which his protection would qualify him — was inviting trouble. […]

Top Ten Anti-Phishing Tips

On August 29th, NU PropertyCasualty 360 ran an article called, “Mitigating the effects of a malware attack”. It said this, in part: When cyberstalkers go phishing, it can lead to ransomware attacks and the loss of valuable information … The goal of any cybercriminal is to make money through an attack. Access can be gained through systems that have […]

Your Supply Chain is As Strong As Its Weakest Link

Supply chains seem to be making news these days, especially since the COVID-19 pandemic threw a monkey wrench into them. But physical supply chains may be the least of your worries. Here’s why: A simple definition of supply chain is this: A network between a company and its suppliers and partners. The operative word in […]

The Earth is Not Flat

Okay. We admit the title of this post is a gotcha. But it’s also relevant to cybersecurity. How? We thought you’d never ask. Consider: If the earth were flat — and unless it was two-sided like a sheet of plywood — it would always be daylight because it would never turn away from the sun. […]

Is Cybersecurity a Competitive Advantage?

It is now. Some people think IT and cybersecurity measures inhibit or reduce the efficiency of their businesses. At one point, that may have been true. That was then. This is now. Given the proliferation of hackers and the corresponding numbers of cybersecurity attacks, cybersecurity is now a necessity. It’s also a competitive advantage. Here’s […]

It May Be Too Late

We don’t mean to be alarmist, but if you haven’t tightened up your cybersecurity, there may be millions of individual reasons to do so. Here’s one, from Ars Technica: “Hackers hammer SpringShell vulnerability in attempt to install cryptominers.” The article says this, in part: “Malicious hackers have been hammering servers with attacks that exploit the […]

Time is Not Your Cyber Friend

Remember those cybersecurity initiatives you’ve been putting off for years? If you’re involved in government contracting, particularly with the Department of Defense, you won’t be able to put them off much longer. According to this article — “Pentagon updates timeline for CMMC cybersecurity initiative” — time is running out. Take a look: The Department of […]