Initial info on the “CMMC changes” we’ve been hearing about is here. I’m glad to reflect on taking the common sense route from the start when advising. “What should we…Learn MoreCMMC 2.0 – CMMC Changes
Our friends at Cybercrime Support Network are working hard to compile a catalog of resources to assist survivors of cybercrime on their road to recovery. Their Cyber Resource Catalog lets…Learn MoreCyber Resource Catalog
10 Week Virtual Program – 1 hour weekly sessionsTo meet the needs of individuals impacted by romance imposter scams, Cybercrime Support Network has developed a Peer Support Program. This program…Learn MoreCSN: Peer Support Program
Everything depends on your domain name. How are you protecting it? -Who is (whois!) your registrar?-Who has access to your account?-What email address is associated with your account? How is…Learn MoreDomains, Registrars, and DNS
Phishing emails or text messages may appear to come from a company you trust and claim that there is a problem with your account or your payment information. The email…Learn MorePhishing resources for personal accounts
ScamSpotter.org, powered by Cybercrime Support Network and Google, has had 318K unique views in its first year. The Scam Spotter partnership came from a shared desire to provide seniors with…Learn MoreScamSpotter.org – Security tips for Internet users
In light of the recent Kaseya supply-chain attack, the relationship between IT/manged services providers and small to mid-sized businesses has come to the forefront. Responsibility and expectations are the the…Learn MoreCybersecurity for SMBs and MSPs
I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking about and being aware of.…Learn MoreShadow IT: Google Chrome Remote Desktop