Breakfast Bytes

Kaseya VSA Breach Analysis

Practical Usage of Cyber Liability Insurance

Location Services, Face Unlock on iPhone, Colonial Pipeline attack

Incident response and strategies for mitigating supply chain attacks

Exchange HAFNIUM attack

· Pretty much every Exchange server on the planet got hacked that was internet accessible without protections in front of it

Challenges with having baseline 101 level quality IT services

Beware of outsourced help desks

Items to use to assess your IT services provider

Dark web scanning, identity and access management, cybersecurity training for staff

Counterparty Risk

Solarwinds hack and how it related Dominion voting machines

Juice jacking - don't use public charging stations

Overview of the secure endpoint strategy you need to be using for 2021

Zero trust cybersecurity posture concepts. How many agents should be on an endpoint? Examples of some good products we should use and why Concepts of the technology security stack

Bluetooth BLUR attacks

Bluetooth range estimator

How easy is it to not get hacked?


Wireless troubleshooting transitive trust agreements and how they introduce risk to your organization.

Real world examples of small business security compliance problems

Geofence Warrants, Waze for COVID 


Those who invested in security proactively are in an excellent condition now.


Waze for COVID

Wireless security, wireless TCO, 3-2-1 backup strategy, MFA and IP access control strategies

Vehicles and privacy

Location services issues and how it relates to personal physical security

Why many IT business decision makers make mistakes. Why bidding out IT jobs often fails

Topics: Sim jacking, More AWS data breaches affect hundreds of thousands of people, Hacking using smart light bulbs, IoT bricker, MFA options

email security and cyber risk insurance  htt

The dark side of smart cities, A clothing line designed to distract the panopticon, Geofencing warrants, and horror stories of hospital IN-security

Facial recognition, systems with Windows Defender compromised, and 11 recent security vulnerabilities highlight the necessity of viable network layer security strategy.


Security News 

Additional Info: 

FTC vs LabMD court case and what we can learn from it.

Security News: Legal liabilities of read receipts, VFEMail and data stores completely destroyed, Facebook storing passwords in cleartext, Why WPA3 is not secure either, and ASUS software updates install backdoors on thousa

NotPetya; the most devastating cyber attack in history. 


Additional information:

Browser add-in NewsGuard

Communications Decency Act - Section 230

Privileged identity management

Failure of the one identity concept.

Virtual Patching, Telecom Fraud, Running VM Server on NAS

TruthFinder evaluation, SIM jacking, and Why SMS for multi-factory authentication is very risky.

Appliances versus real server hardware and video surveillance system design.

Server Hardware, Windows 10 and IPv6 requirement, Running a VM on a Synology NAS

Tech companies and their scoring system

Security Protocols and Ciphers- Educate yourself about the dangers of 5G radiation to human health

Totalitarian Surveillance

Dangers of 5G Radiation

Avoiding Identity Theft and Location Data Sharing

Website Security, how to keep your website secure and why it is necessary. TLS 1.3 impact for all end users of all browsers and what it means

How to avoid business email compromise scams

Part 2 of the Verizon data breach team's report analysis and related identity theft topics

Verizon Data Breach Investigations Report review.

Cloud hosted servers are usually a rip-off;Explanation of SaaS versus IaaS

Deprecated software follow-up, Examples of more VOIP providers and discussion about the security or lack thereof regarding their services, Amazon spy devices

Deprecated Software and Network Security Strategy

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives

Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives