Colonial Pipeline Administrator Should Have Used a Password Manager

The VPN login was unused but active at the time of the attack, the report said. Additionally, the password has since been discovered inside a batch of leaked passwords on the dark web, suggesting that an employee of the company may have reused the same password on another account that was previously breached. The Hacker […]

Read More

Podcast: Passwords Suck

This episode took me a while for some reason. I’m not sure why. It’s about passwords. The bane of everyone’s existence, so you would think that it would be simple, right? Apparently not. I mention password managers a lot in this episode. I also go over how the hackers take advantage of our laziness and […]

Read More

John Virgolino on the Virtual CISO Podcast

Manufacturing tends to resist new technology. Not aerospace, though. It’s on the cutting edge. Our own John Virgolino, President/CEO at Consul-vation, discussed technology in the aerospace sector with John Verry, CISO and Managing Partner at Pivot Point Security in episode #43 of The Virtual CISO Podcast. As experts in managing IT security and privacy risk, […]

Read More

What’s the best way to back up data and keep it safe?

Let’s face it, stuff happens. Computers crash, hard drives fail, access to the Internet goes down, and electricity goes dark. We rely on our infrastructure to keep our data safe, yet sometimes the unexpected happens. Thankfully, we can be proactive and prepare for most disasters. Backing up our data is an essential part of mitigating […]

Read More

Is it Safe to Put Data in the Cloud?

Is it safe to put data in the cloud and can it actually be safer than storing it on personal computers or on-premise business servers? Like all questions around risk, it depends.   Unless your company is hosting its own private cloud infrastructure, most cloud services are hosted publicly and are only accessible through the Internet, […]

Read More

How Do I Prevent Being Hacked?

Our emails, online accounts, personal information, business data, and just about everything we do on our smartphones and computers are at risk of being hacked, stolen, and used against us. There are over 30 billion Internet-connected devices on the planet, and every one of them is a target for cyberattack. But why? TARGET PROFILE Our […]

Read More

Podcast: Compliance

Get ready, this episode is all about compliance. Security compliance to boot. It’s not the most exciting topic, I’ll admit, but it is a necessary one and your business may have to comply. We are going to do an introductory overview of IT and security compliance requirements and some of the things to look out […]

Read More

It’s Time to Upgrade to Windows 10

Windows 7 End-of-Service-Life (EOSL) ended in 2009 for mainstream users. Despite a lack of support for their system, and because they believe it to be the most stable operating system, the hesitation to upgrade remains for many loyal Windows 7 users. Additionally, businesses using Windows 7 see upgrading their users as a daunting and time […]

Read More

What is a VPN and is it Right for My Small Business?

VPN stands for Virtual Private Network, which is tech-speak for a secured connection in an otherwise unsecured environment. It’s an encrypted tunnel that allows our devices to communicate safely with our office network while outside the building. Although our small business data should be protected internally from hacking attempts, viruses, malware, and every conceivable form […]

Read More

Where should you host business email?

When it comes to hosting your business email, one size does not fit all. What may be right for another business may not be right for yours. To help you find the right fit for your company, we’re going to give you a semi-technical overview of how conventional and cloud-based email systems work. Then we’ll […]

Read More