Cybersecurity Toolkit

I remember the first box of tools I picked up at the garage sale. The box was filled with an old hammer, two screwdrivers (one flathead, the other Phillips head), a rusty wrench, and a tape measure. It wasn’t much ...

Windows 11 Update Might Cause Brother Printer Problems

Early adopters who are rushing to embrace and experiment with Windows 11 and that use Brother brand printers may experience printing problems. Microsoft recently posted a help article on their website explaining ...

AirPods Pro Repair Program Extended For Static Sound Problems

Are you an AirPods Pro owner? Do yours crackle and hiss? If you answered yes to both of those questions be aware that Apple has recently extended the support window for the ...

The 7 Ghosts of Cybersecurity

October is Cybersecurity Awareness Month, but it also well known, among the vernacular of the younger generation, as Spooky Season. Most people are more concerned with ghosts, ghouls, and goblins than they are with the dangers lurking in the dark ...

Man-Made Problems in the Digital World

If you’ve watched any sci-fi movie, you probably understand the perceived dangers of the digital world. Primarily the unrealistic dangers of artificial intelligence. Now, I’m not saying that AI won’t be a threat in the future but it’s important to ...

Apple Releases Updates to Actively Exploited iOS and iPadOS Vulnerability

The vulnerability allows for arbitrary code execution at kernel level permissions and appears to be actively leveraged by threat actors. A software update should be performed ASAP.

The Secret History of Cybersecurity Awareness Month (And its Not-So-Secret Future)

Have you ever wondered where all those weird holidays come from? Like, who got to decide that April 23rd was National Talk Like Shakespeare Day? Or that Squirrel Appreciation Day would fall on January 21st? Or that the last Friday ...

Want To Make Sure Your Business Is Protected From A Data Disaster?

Did you know that 93% of all businesses – that don’t have a disaster recovery plan in place when they experience a data disaster – go out of business within a year of that disaster? And yet, 68% of businesses ...

Defense in Depth (DiD): Think Like a Hacker

The current threat landscape is rapidly advancing, with cybercriminals constantly upgrading their toolset to break through security defences. If you want to outsmart malicious hackers, it’s time to start thinking like them. Fend them off with various layered defence methods. ...

7 Elements of an Effective Defense in Depth (DiD) Security Strategy

DiD is a cybersecurity approach in which multiple defensive methods are layered to protect an organization. Since no individual security measure is guaranteed to endure every attack, combining several layers of security is more effective. Discover how layering security methods ...