Contact Us

Newsletter Sign-Up

1 min read

1 in 10 Macs infected by Shlayer Trojan...

By Carl Keyser on Jan 24, 2020 2:13:27 PM

While I would never personally recommend a Kaspersky product to save my life, you know, because they're believed to spy on people for the Kremlin (which you can read about here: The Kremlin and Putin are using Kaspersky Labs to spy on you!), there's a new report from them that might have some merit:

6 min read

URGENT: Microsoft Announces Critical Vulnerabilities in Windows Operating System

By Carl Keyser on Jan 14, 2020 3:43:27 PM

The Department of Homeland Security and Microsoft have made an announcement regarding some very serious CVEs that severely compromise the Windows Operating System.

Topics: Microsoft Urgent CVE CVE-2020-0601 CVE-2020-0609 CVE-2020-0611 CVE-2020-0610
5 min read

Should You Be Worried About Iran?

By Carl Keyser on Jan 14, 2020 12:41:03 PM

As tensions rise in the Middle East, it's increasingly likely some American businesses/agencies will be faced with cybersecurity attacks from the Islamic Republic of Iran.

Topics: Cyberattack 7 Steps Iran
6 min read

What is a Managed Cybersecurity Services Provider?

By Carl Keyser on Jan 9, 2020 12:46:36 PM

We talk a lot about being a Managed Cybersecurity Services Provider and I thought it'd be a good idea to dive into exactly what a Managed Cybersecurity Services Provider is.

Topics: Managed Security Services
6 min read

What is a Social Engineering Attack?

By Carl Keyser on Jan 7, 2020 4:06:10 PM

I wanted to take a moment to dive into something called “Social Engineering."

Parts of what I bring up is going to sound a bit familiar. There’s going to be a bit of overlap regarding things I've featured in this blog previously.

6 min read

ISO 27001: The Compliance Chameleon

By Carl Keyser on Dec 31, 2019 3:19:47 PM

Executive Summary: ISO 27001 is the only internationally-accepted and recognized information security standard in existence. It can be implemented in any organization (regardless of size), and in any vertical. 

There’s no such thing as a 100% foolproof security posture, but ISO 27001 gives you a very real blueprint from which you can ultimately build your security defenses in an practical and effective way which enables an organization to safely conduct business amidst dynamic threats.

Compliance regulations are a pain in the butt. There, I said it. They’re difficult to understand, there’s TONS of room for personal (and often incorrect) interpretation, and quite frankly there’s a lot of gray area regarding whether or not any legislative body actively enforces them.

Topics: Thought Leadership ISO 27001 Compliance PCI PII HIPAA
7 min read

RIP: My Cousin Alan Has Died - How to Spot a Social Engineering Attack

By Carl Keyser on Dec 3, 2019 2:53:24 PM

My cousin, Alan, has died.

He has ceased to be, bereft of life, he rests in peace, he has kicked the bucket, hopped the twig, bit the dust, snuffed it, breathed his last, and gone to meet the High Mucky-Muck in the sky. And you know what I have to say about that? Good riddance to him, the freeloading bastard! I hope he fries!

Topics: Phishing Social Engineering, Spear-Phishing Pretexting Vishing

Featured