Affordable Cybersecurity for Small Businesses


White Papers

Check out David's White Papers:

  • The Cybersecurity Value Proposition for Small Business - How cybersecurity investment provides competitive advantage
  • Cyberhygiene: An Overview - The evolving Cyber Hygiene Inventory (CHI) as an industry standard
  • Cyberwar is Upon Us - The increase in nation state threat actors along with focus on critical infrastructure
  • Ransomware and the HIPAA Security Rule - Health and Human Service's recommendations to reduce ransomware risk for practices
  • A Cybersecurity Maturity Scale for Small Businesses - Typical attributes of maturity levels, with recommendations for improving
  • How to Create A Strong Password You Can Remember - Tips for good cyber hygiene with regards to passwords


Check back for regular additions, David loves to write...

Cybersecurity News You Can Use

Cybersecurity News

For Healthcare Providers and Associates

Ransomware Attack News

image179

Zoom has instantly become a household name, with global workers and students in COVID-19 lock down.


Bad guys are targeting users of Zoom and similar products like classroom.google.com with fake websites and  malicious files in phishing emails

Ransomware Attack News

For Healthcare Providers and Associates

Ransomware Attack News

image180

Some ransomware operators are promising not to attack hospitals and healthcare providers during the pandemic. Others are licking their chops.


Click below for our latest ransomware threat intelligence for healthcare providers

For Healthcare Providers and Associates

For Healthcare Providers and Associates

For Healthcare Providers and Associates

image181

According to this latest study, 87% of healthcare organizations surveyed report they have insufficient IT staff and budget to improve their security posture.

Click below for our coverage of the current state of cybersecurity budgets, the risks associated with insufficient cybersecurity funding, and how to stretch your cybersecurity spending to meet security and compliance goals. 

Data Breaches in the News

Lewis County Global Counterespionage Center

For Healthcare Providers and Associates

image182

Check here to learn about organizations with recent breaches of their PNW customers' data. 


This week we cover the Clearview AI hack reported in February. Clearview AI uses social media photo scraping to build a database of billions of photos which they've sold to 600 law enforcement agencies. 


Learn more about facial recognition and the hack by clicking the button below 

Phishing Scam Monitor

Lewis County Global Counterespionage Center

Lewis County Global Counterespionage Center

image183

See below for news and analysis about social engineering in the time of COVID-19


Our latest story dissects an actual phishing email using a COVID-19 lure


Also see our recent investigation into phishing emails and websites disguised as legitimate Coronavirus news. 


Click below for both stories.


Lewis County Global Counterespionage Center

Lewis County Global Counterespionage Center

Lewis County Global Counterespionage Center

image184

Espionage used to be the realm of nation state diplomats and intelligence officers. The chances of an American civilian being personally attacked by a foreign agent was practically zero.  This is no longer the case. 


This week we  provide a summary and analysis of the Crowdstrike 2020 Global Threat Report, including the latest news about the APT we love to hate: Fancy Bear

More Threat Intelligence

Exploit Alert

Exploit Alert

Exploit Alert

image185

The list of hackable devices continues to grow with the expansion of the Internet of Things and the digital economy. Check here for noteworthy hacks of anything from a smart phone to a coffee maker or elevator.


Our list of unpredicted but scary device hacks continues to grow. Our latest story covers smart vacuum cleaners, which hackers can use for real time video surveillance of your private residence.

Hacker Gizmos

Exploit Alert

Exploit Alert

image186

Gizmos have been a staple of hacker culture since the eighties. Here is where we showcase interesting devices that use technology in unusual and innovative ways. We also tell you about nefarious devices you need to be aware of for your protection


We couldn't resist buying the hacker favorite Baofeng UV-5R amateur home radio.   For ~$30 (HAM operator’s license not included) you can buy this little guy that can communicate globally and even to the International Space Station.   

Cybersecurity News

Ransomware News

Healthcare Data Privacy

Who Lost My Data?

Phishermen's Corner

Lewis County Counterespionage Center

Exploit Bulletins

Think Tank

Hacker's Toy Box