Return on Prevention vs. Return on Regret This is a real-life experience. I went down to one of the main hotel/casinos on the Las Vegas Strip to meet a buddy and his wife who were in town for some fun and some gambling. As my buddy and I were standing and chatting in the casino by the poker tables, a big guy with an athletic build approached us and asked us what we did for energy and fun? My buddy and I did not know this guy, so we were a little confused and we both answered with sort of a vague “not much”. TheRead More →

Why are ransomware attacks soaring? Because they are working! It is estimated that by 2021 the predicted ransomware damages will be $20 billion. Why are ransomware attacks working? Traditional information security solutions are easy to beat! Do you remember everything from your last information security training? Do you even remember when your last training was? Why are new solutions needed? Because traditional solutions aren’t working! Watch the video below to learn more about these new solutions. Click here to learn more about the solutions discussed in this video.   Read More →

The First Preventers Playbook: How to Intervene, Disrupt, and Prevent Tragedy Before It Strikes. Enough is enough! Old playbooks and strategies depend on First Responders (defense), however First Preventers (offense) are needed too. It’s time to use a new prevention playbook to prevent more incidents and tragedies, The First Preventers Playbook is just in time to show you how. LAS VEGAS, NV – “For too long, we have ignored the signs of mass casualty attacks and refused to work together to “connect the dots”. Rick has given us a roadmap to do just that,” Captain Griger, Sarpy County Sheriff’s Office. Leaders in schools, higher education,Read More →

The Twitter hack is pretty alarming when you realize what a couple of teenage hackers were able to accomplish using one of the oldest hacking techniques in the hacker playbook. Twitter Attack What happened? Twitter employees were hacked by hackers using social engineering and exposing human vulnerabilities and lack of awareness. The result was several Twitter accounts of some very well known people were taken over by the hackers. Twitter said the hackers “successfully manipulated a small number of employees and used their credentials to access Twitter’s internal systems, including getting through our two-factor protections.”  Twitter released an update later and said the hackers “targeted aRead More →

Scary Indicators for School Leaders… Shootings, COVID, Mental Health & More Targeted Violence In a 2019 US Secret Service analysis, between 2008 and 2017 41 schools experienced targeted violence which is scary enough. However, it is also scary because BEFORE the 41 attacks occurred: ALL the individuals (attackers) exhibited concerning behaviors before the attack ALL the attackers experienced social stressors involving their relationships with peers and/or romantic partners Nearly all attackers experienced negative home life factors Sadly, none of the 41 schools were able to take advantage of the indicators (concerning behaviors, social stressors, home life factors, leakage, warning signs, red flags, etc.) to intervene,Read More →

16 years ago, on July 22, 2004, the 9-11 Commission Report was released. Do you remember one of the most important revelations in the 9-11 Commission Report? National intelligence is still organized around the collection disciplines of the home agencies, not the joint mission. The importance of integrated, all source analysis cannot be overstated. Without it, it is not possible to “connect the dots”. No one component holds all the relevant information. The biggest impediment to all source analysis – to a greater likelihood of connecting the dots – is the human or systemic resistance to sharing information. The 9-11 Commission Report revealed there wereRead More →

Hackers and breaches create huge costs and unwanted consequences, but most were preventable. Hackers – cyber criminals, corporate espionage, state-backed countries, insiders, ex-employees, and others want your organization’s information or your money. Every day hackers are successfully breaching organizations, taking advantage of gaps, and then taking the organization’s proprietary information or holding the organization’s information for ransom. Hackers are like cockroaches; they will enter wherever gaps exist. Hackers are successful because PEOPLE (employees, contractors, third-party service providers, vendors, remote workers, etc.) lack ongoing awareness about the latest phishing, business email compromise, and ransomware attacks, creating a gap for hackers. It only takes one gap, oneRead More →

As organizations are reopening and returning to work, how are you managing all the new pains and liabilities related to COVID-19 challenges on top of all the existing challenges you were already dealing with? It’s time for reopening and returning to work, however, managing lots of new COVID-19 challenges on top of all the existing challenges can create lots of new pains and liabilities too. Some of the new challenges include new and different fears, stressors, confusion, phases, compliance, and safety.  For example: How will you manage fears of employees, students, and guests who fear they may be infected with COVID-19 at work? How willRead More →

Major events, like the Coronavirus (COVID-19), are major problems that can lead to more major problems beyond just the scope of health and health care. HACKERS (the Villains from the Dark Web) see major events (pandemic, sports, elections, natural disasters, etc.) as opportunities to take advantage of fears, emotions, confusion, and curiosity by sending phishing emails or fake emails to trick employees, perhaps even your employees. Recipients (your employees, staff, etc.) are tricked into clicking on web links, opening attachments, or taking actions that could lead to ransomware, viruses, business email compromises, and many other problems. With more of your employees are working from homeRead More →