The Single Most Important Cybersecurity Action Leaders Must Take

The single most important action every organization leader needs to take in regard to cybersecurity is to know what security and monitoring measures they are currently paying for. Nine of out ten leaders with whom we meet have no idea what cybersecurity measures are deployed on their networks and devices. Furthermore, these leaders cannot easily access any document outlining the … Read More

8 Cybersecurity Must Haves for Every Organization

I recently heard someone say, “Personal data is personal data, and it’s worth something to someone.” In today’s digital world, your data is your most valuable asset.  Organizations have a moral and legal obligation to protect customer data and an obligation to themselves and their employees to secure sales, marketing, and financial documents. “Cybersecurity protection” has become one of those … Read More

Local Legends: Why Municipal Governments are The Best (and The Worst)

Local governments are the most important government agency when examining citizens’ daily lives. They are also essential to the profitability of local businesses (which is why all of you business leaders need to keep reading). Does your business require employees? Does it need customers? Are you in need of advertising and marketing opportunities with your target demographic? Chances are, your … Read More

Case Study – P@s$w0rds at the U.S. Department of the Interior

Your password has expired. To change your password, press CTRL + ALT + DELETE and then click “change a password”  New Password: Password1234!  Confirm New Password: Password1234!  New Password: Password789!!  Confirm New Password: Password789!!  New Password: ThisIsStupid!@#  Confirm New Password: ThisIsStupid!@#  At this point, your head is about to explode. Do passwords really matter that much?   YES. Password strength and … Read More

Let Me Get The Door

Have you ever held the door for someone only to realize later you should have let it slam in their face? Metaphorically speaking, of course. Cybercriminals exploit “open doors” as the entry point for theirattacks and countless companies are keeping the doors WIDE OPEN. “People who have no weaknesses are terrible; there is no way of taking advantage of them.” … Read More

How Did This Happen?

It’s 6:03am and you receive an email, Teams message, and text message alerting you to an emergency meeting of all company leadership at 7:00am in the office. You arrive on time but remain caffeine deficient as your first cup of coffee has yet to be consumed. Once everyone is seated, looking far more disheveled than usual, the CEO shares that … Read More

Data Rich and Resource Poor: The Most Exploited Industry

If a hacker wanted to locate ALL the following information from a single source, where would they attack? If you guessed “a school database” you would be correct. Schools, both publicly funded and private, collect and retain a significant amount of data. For years, social media has been the focus of concern and debate among parents and educators for good … Read More

Cyberattacks and Pickleball: A Study of Rapid Increase

What do pickleball and cybercrime have in common?   According to statistics released by USA Pickleball, the number of Americans participating in the sport rose 85% from 2021 to 2023 making it the fastest growing sport in the US. During this same two-year period, data breaches increased 72% making cybercrime the fastest growing crime in the US. While the rapid increase … Read More

Failed Test, Phishing, and Infections: An Introduction to Data Breaches

“The most dangerous enemy in the world is the one you do not recognize.” Tess Gerritsen  Last week, a client of ours failed a test. They not only opened the email… they entered their log-in credentials. They were THAT employee. And they were an executive.   Luckily, the email was part of the ongoing cybersecurity training MiTech Services provides to clients, … Read More