

March 24, 2025
ClickFix: A Highly Opportunistic Threat
A new form of malware, dubbed “ClickFix,” is tricking users into infecting their own devices…

February 18, 2025
Cybersecurity and IT: It’s All About Healthy Boundaries
Many organizations mistakenly house their cybersecurity function within their IT department, assuming the two functions…

January 21, 2025
The “S” in IoT Stands for Security
It’s an old joke in the cybersecurity community: the internet of things is not secure–at…

November 14, 2024
Generative AI: A Demon Unleashed or Just Another Tool?
Adjusting our attitudes about new generative AI tools is critical to successfully integrating them into…

September 5, 2024
Device Hardening for Kids Revisited
In the time since we first wrote about device hardening for kids in late 2019,…

April 22, 2024
A Bias for Action: SMBs Should Prepare for Cyberattacks
Cyberattacks are a predictable part of doing business, and small to midsize businesses (SMBs) are…

February 21, 2024
Ready or Not: Deepfakes Are Here
Cheap, sophisticated deepfake technology has lowered the barrier to entry for scammers of all skill…

November 29, 2023
Data Breach Notification Law in Tennessee
When data that you maintain is unlawfully accessed, you are obligated, by law, to take…

October 30, 2023
The Cybersecurity Poverty Line
Since it was first conceived in 2011, the idea of a cybersecurity poverty line has…