Posts about


August 3rd, 2021

Protecting Water Infrastructure Against Cyberattacks

Like many critical infrastructure verticals, the water industry faces increased cybersecurity risks. 

July 2nd, 2021

PrintNightmare Vulnerability Affects Windows Users

Users have been plagued with vulnerabilities found in the Windows Print Spooler services for years. The most recently discovered exploit is yet again causing headaches in the cybersecurity community.

May 20th, 2021

Sophisticated Ransomware Attack Shuts Down the Irish Health Sector

June 23rd, 2020

Australia Faces Wide Spread Cyber Attack

Prime Minister Scott Morrison has spoken about a major cyber attack.

April 8th, 2020

Beware of Federal Stimulus Package Scams

The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of you might already be familiar with the fake Center for Disease Control and World Health Organization emails, we..

April 3rd, 2020

How Safe is Zoom?

In March 2020, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is one of the leading video conferencing software applications on the market. The use of this platform spiked amid the Covid-19 pandemic as businesses, schools, and governments transitioned to..

March 16th, 2020

The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google Chrome. Most assume that Chrome extensions are nothing more than a combination of JavaScript and HTML files..

August 18th, 2019

Threatlocker Enables the Essential Eight

ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought it was worth the effort to provide a quick breakdown of how ThreatLocker can enable this critical strategy for..

August 12th, 2019

How Application Whitelisting and Ringfencing protects you from BlueKeep RDP vulnerability

The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability is discovered in Windows. Generally, by the time the vulnerability is public knowledge, Microsoft has released..

August 1st, 2019

Anti-Vaxxing and Cyber Security

I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.

October 10th, 2018

Less Hackable - For Small Business Owners

After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: "How can I make myself unhackable?" Seldom do they understand when I try to explain that there is no such thing as unhackable.

September 9th, 2018

Text compliments encourage users to download apps they don't need, exposing your data

ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk.
1 2 Next