So we are all happy to use LLM AI’s to help us run our lives more efficiently, but I was wondering how do we test…
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too…
Or what could be worse? What happens when the secret service show up at your door? First do not panic – ask for a badge.…
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers),…
Yes you should use password managers, long passwords over short complex as you see below’s XKCD famous image. we discussed in our blog oversitesentry before:…
Triple extortion Ransomware means that a good backup is not good enough anymore: https://rumble.com/vhaoeh-full-fixvirus-show-may19.html Because the data may be stolen and ransomed to patients/clients/ 3rd…
NSA insights video(7/18/18) gives an overview of what is happening in their Cybersecurity Threat Operations Center. The presentation explained when the Equifax hack happened…
Why? Once the criminal has hacked your computers they can sell the “access” to your devices. How can I say that? Kaspersky¹ and others have…
If you want to use the Internet then you must know now you are within arms length of all people with a computer in this…
The first thing that happens is we know that the IT personnel are working overtime and are still not keeping up with problems. How you…