Domain Time II exploit

One of the world’s leading software packages has been discovered to be vulnerable and this can touch nearly all enterprise networks. User interaction is needed to exploit the vulnerability but that can happen all too often. Domain Time II is a software used by the...

10 Mistakes everyone makes with passwords

If you had the option to choose the shape of the key to your front door, would you choose it to be flat and even? Use a password that is hard to guess. Security firms regularly report the most widely used and most obvious passwords, and the same suspects always pop...

Microsoft Exchange March 2021

47 Thousand servers are still affected in the USA alone. If you use Exchange servers you are most likely vulnerable to what can become the hack of the year, or even worse. Malicious actors have gained access to over 30 thousand Exchange servers in the USA, hundreds of...

Protect Kids From Cyber Threats

TLDR ↓ Just as well as parents and educators ensure the safety of home, school and playgrounds for their children, one would assume they should ensure all the gathering “places” where kids meet and interact, such as the virtual world. When kids get on a phone or...

CEO: CyberSecurity while traveling.

TLDR ↓ Out there, there is no managed firewall nor a support team that can shut things down or turn things up for them; they would be head to head with the hacker nerding out on a computer a few seats away, and you should not be comfortable with these odds. >...