Blog

Client Spotlight | William D King

William D King founded ABA Business Advisors (ABA) in 2011 to provide tax minimization strategies to the medical community and small businesses. With clients in all 50 states, ABA is one of the nation’s few tax firms with a nationwide ...

Cybersecurity Lingo: What is a "botnet" ?

Cybersecurity Lingo: What is a "botnet" ? A botnet is a group of computers bad guys have under their control, usually thousands or more. Botnets are used to: Mine bitcoin (use the hacked person's electricity) Attack other machines (they can't ...

Take a Break and Have Managed IT Services

According to WATE, Knoxville police pulled over a driver speeding down I-40 at over 100 MPH in May. Why? He said he needed to use the bathroom. Sure, that’s a load of sh*t, but you know what? I have some ...

Cybersecurity Lingo: What is a "zero day" ?

Cybersecurity Lingo: What is a "zero day" ? A zero day is the worst kind of security bug: a hole that is already in use by attackers or was published before a software vendor could fix it. The vendor has ...

Cybersecurity Lingo: What is a "CVE"?

Cybersecurity Lingo: What is a "CVE"? It is a unique ID for a specific security bug. This ID is unique to every bug ever found, no matter what piece of software it is. For example, the log4j bug that showed ...

Cybersecurity Lingo: What is a "malicious actor" or a "bad actor"?

Cybersecurity Lingo: What is a "malicious actor" or a "bad actor"? The rest of the world calls these people hackers. It's pretty simple. Inside computer culture "hacker" can have different connotations, so we came up with more confusing language 😆 ...

Cybersecurity Lingo: What is an "Attack vector" ?

Cybersecurity Lingo: What is an "Attack vector" ? This is *how* a malicious actor enters your system. For instance, they may buy passwords on the dark web and login to your email that way. Or if they successfully phish an ...

Cybersecurity Lingo: What is an "Attack Surface" ?

Cybersecurity Lingo: What is an "attack surface"? Simply: it is anywhere an attacker can get into your systems if proper security is not applied. This includes your servers, your websites, your email, your software (even your close software). To INCREASE ...

UPDATE YOUR SOFTWARE ALREADY

I know I know, you hear it all the time, BUT UPDATE YOUR SOFTWARE. Today's bugs all come from Chrome, where we have MULTIPLE security vulnerabilities that all rank as HIGH -- according to Google. What do they do? Google ...

WordPress: I'll Download that Database, Please

A recent WordPress vulnerability allows hackers to basically download* the entire site. Here's why that matters to you: Your small business website probably runs on WordPress. Your website has contact forms, phone numbers listed, etc. Maybe a blog like ours. ...

Contact

CyberSecureRIACyberSecureRIA Logo $$$