Breaking Down I.T. with Steve

I am absolutely thrilled to share the exciting news about my inaugural podcast, Breaking Down I.T. with Steve! In this podcast, we delve into captivating discussions with businesses, just like yours, exploring the realms of cybersecurity, offering invaluable tips and tricks, and uncovering the secrets to achieving both security and profitability. Join me for an…

Read More

Unleashing the Nightmare: Walmart’s Chilling Data Breach Saga

One of the largest retail giants globally, Walmart, has recently reported a significant data breach to the U.S. Department of Health and Human Services Office for Civil Rights. While the exact details regarding the nature of the stolen data remain undisclosed, the manner in which Walmart made the filing strongly suggests that the compromised information…

Read More

Recent Cyber Incidents reported in the past week!

It has been a tumultuous week marked by a series of concerning cyberattacks. Firstly, the financial advisory firm Kroll, a financial advisory firm, has recently experienced a data breach. The firm is handling bankruptcy proceedings for DeFi companies FTX, BlockFi, and Genesis Global Holdco. Kroll said that on August 19, bad actors targeted a T-Mobile…

Read More

Spotify Gets Hit Again

Protection against credential stuffing isn’t something that a company like Spotify should struggle with, and suffering two credential stuffing incidents in one quarter shows a sloppy attitude toward security. As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify has returned for another appearance with a credential stuffing disaster eerily…

Read More

New Malware Maker Got Past Apple Security

Apple has been historically very good at keeping malware out of their app store, and they’re constantly improving their security protocols on that front. In fact, since February of this year (2020), all Mac software distributed outside of its Mac App Store must be notarized by Apple. The developers must demonstrate that their products are…

Read More

7 VPNs that you thought were safe

7 VPNs that leaked their logs – the logs that “didn’t exist” VPNs are all the rage these days, because they’re supposed to boost your privacy and stop you being tracked. In fact, “VPN” has become a word in its own right, pronounced vee-pee-en, and it’s a crowded market with companies advertising online, on TV…

Read More

Hackers Attacking Exchange Servers In New Warning From Microsoft

Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest Microsoft statistics, which show a marked increase in the use of web shells on on-premises Exchange servers. The company is currently tracking multiple ongoing attacks, some of which…

Read More

Backup is King

Everyone should backup their data, especially for a business. Unforeseen events happen and no matter how much you pray, wish or deny, failures happen. I believe in the 3-2-1-0 Rule, regardless of Operating System, Manufacture or Support Contract. This approach helps to answer two important questions: how many backup files should I have and where…

Read More

Our privacy is once again being trampled on.

The US Senate recently passed a bill to extend elements of the Patriot Act. Notably, this legislation included parts that would increase the FBI and CIA’s ability to legally access your browser search history without a warrant. The age-old argument that’s often trotted out when government power is expanded to trespass on individual privacy is…

Read More