Extortion is nothing new, but this one is a bit upsetting

A new sextortion scam is targeting unsuspecting users. The scammers claim to have recorded the user watching porn and threaten to release the footage unless they pay up. The email contains a link that leads to a fake YouPorn login page. If the user enters their login credentials, the scammers can use these credentials to […]

California Privacy Agency Proposes New Rules on Risk Assessments and Cybersecurity Audits

The California Privacy Protection Agency (CPPA) is the first state agency in the US dedicated to enforcing the California Consumer Privacy Act (CCPA) and its amendment, the California Privacy Rights Act (CPRA). The CPPA recently published draft regulations on risk assessments and cybersecurity audits that businesses must conduct if their processing of personal information presents […]

There is a big gap growing between Cybersecurity insurance coverage and reality.

Delinea Research has published its 2023 State of Cyber Insurance Report, which reveals a growing gap between insurance carriers and organizations seeking robust coverage. The survey, conducted by Censuswide on behalf of Delinea, sought to identify shifting patterns since last year’s analysis. Insights from 300 US organizations highlighted an escalating trend: securing cyber insurance is […]

Hackers take down Twitter/X to demand Starlink from Elon Musk

A hacking group called Anonymous Sudan took X, formerly known as Twitter, offline in more than a dozen countries on Tuesday morning in an attempt to pressure Elon Musk into launching his Starlink service in Sudan. The hackers claimed they wanted to raise awareness about the civil war in Sudan and the poor internet quality […]

How ArchonOne Helps Businesses Maintain Security Compliance

As regulatory compliance requirements continue to evolve across a broad range of industries from law firms to financial services, it can be challenging for businesses to keep up with the ever-growing scope of compliance. Gone are the days when a quarterly risk assessment was enough to understand whether your security posture was still in good […]

Migrating Your Law Firm’s Phone System to the Cloud

If your law firm has a phone system hanging in your closet and you’re looking to it move to the cloud, this is for you. Preparation The first and most important step is to collect a list of all the important phone numbers the attorneys at your law firm are currently using.  Although they might […]

Kaseya VSA Security Advisory

“What happened? Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us – universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data.” […]

NIST Tips and Tactics for Ransomware

Ransomware is a plague that we all have to deal with, but it doesn’t mean that you have to be affected by it. Check out these 8 Tips and 3 Tactics to handle Ransomware before it becomes a show stopper for your organization.

Important Ransomware Risk Information for Your Organization

In under 4 minutes, we cover “What happens if your business is a victim of ransomware?” and “Does it really matter if if I’m a smaller organization?” and some advice on how to protect against this advanced persistent threat.

Are We On The Same Page?

This is the question you need to ask yourself and your staff in Q4 this year.  On December 1st, 1913, Ford created the first assembly line and built a huge empire on repeating tasks and improving each step along the way with continuous review.  Today’s growth doesn’t primarily come from a better assembly line, but […]