THE CM BLOG.

READ ON FOR THE GOOD STUFF.

Is Your Cyber Security Relationship Like Talledega Nights?

Is Your Cyber Security Relationship Like Talledega Nights?

Just as Cal’s push to outshine Ricky seemed inevitable, cyber security has tried to push its way onto the board agenda, sometimes rather awkwardly around the back of or away from the overall IT agenda. This competition for board attention has led to a few wins for CISCOs, but ultimately has created an extra obstacle for the digital transformation agenda overall.

read more
Securing Your Millennials

Securing Your Millennials

For cybersecurity awareness, behavior and culture change we think hard about how we can engage everyone to be more secure. This includes sometimes the challenging feat of bringing millennials onboard with governance and compliance around information security…

read more
COVID 19 Non Compliance

COVID 19 Non Compliance

Getting People On Board When Change Matters. (aka. Why are people breaking quarantine? & How it relates to your Digital Outliers.)There is a shocking amount of non-adherence to clear and immediate directions regarding the coronavirus pandemic. Why is that? Ah, the...

read more
The Matrix

The Matrix

The Matrix In the Wachowski’s film, The Matrix (starring Bill...or was it Ted?), the heroes of the film are betrayed by a member of their own team, Cypher (Joe Pantoliano). In perhaps one of the most prophetic scenes in any movie of recent memory, Cypher sits with the...

read more
Once Upon A Time in Hollywood

Once Upon A Time in Hollywood

A growing tide of unethical, and outright illegal, actors are trying to take advantage of us every day. This blog series will be dedicated to combining these two tools to help illuminate key issues facing us as these bad actors (see what I did there?!) try to manipulate our behaviour to serve their own, selfish, unethical purposes. Allow me to demonstrate…

read more
How Hackers are Exploiting the Coronavirus Outbreak.

How Hackers are Exploiting the Coronavirus Outbreak.

What are the Scares, Scams, Phishing, and Digital Threats to Employees from Hackers Exploiting the Coronavirus Outbreak? During natural disasters and other major events, criminally-minded people and other baddies are willing to do unethical things to make a profit....

read more
How to Protect Your Identity and Data During Tax Season

How to Protect Your Identity and Data During Tax Season

According to Carbon Black, “Research into various marketplaces on the dark web found W-2 forms, 1040 forms and how-to guides for illicitly cashing out tax returns available. W-2s and 1040s are available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, Social Security Numbers (SSNs) and birthdates can be obtained for a price ranging from $0.19 to $62.

read more
PRESS RELEASE – NTE Partnership

PRESS RELEASE – NTE Partnership

PRESS RELEASE The Cybermanics is proud to announce our new partnership with NTE the UK's finest B2B online connectivity providers. For 30 years, they have stoically been connecting UK business together while being at the forefront of the cyber revolution. They know...

read more
Cyber Security podcasts

Cyber Security podcasts

Check out some of the top cybersecurity podcast we have been a guest on. Who doesn't love a podcast? We certainly do. From crime to business we devour podcast like the cookie monster devours his favorite biscuit. One day while tuned into Gary Vaynerchuk's we thought...

read more
Ransomware 3: Protecting Yourself From Ransomware

Ransomware 3: Protecting Yourself From Ransomware

5 Steps to Prevent Ransomware AttacksWhen should you start worrying about ransomware? Well, we recommend before that moment where the ransom demand pops up on your computer. Ransomware attacks can be expensive, time consuming, frustrating, and we have found that...

read more
Ransomware 2: Anatomy of a Ransomware Attack

Ransomware 2: Anatomy of a Ransomware Attack

Anatomy of a Ransomware AttackIt begins with a screen. Perhaps plain, maybe embellished with a skull and crossbones. Appearing before you in a flash-  “Whoa” you say “Hang on, this isn’t right”. The first line reads “You have been infected with ransomware. To get your...

read more
Ransomware 1: How Ransomware Gets In

Ransomware 1: How Ransomware Gets In

Ransomware Attack VectorsJust like an ex breaking your heart, before ransomware can lock up your computer, it needs to get inside.  While ransomware attacks seem to appear out of nowhere, they really aren’t that exciting, using the same old techniques as traditional...

read more
How to stay safe on Black Friday and Cyber Monday

How to stay safe on Black Friday and Cyber Monday

Stay Safe on Black Friday and Cyber Monday Black Friday, the day after Thanksgiving, when retailers take advantage of still woozy and stuffed people with ridiculously low prices and unbelievable sales (for a limited time only!). What a way to kick off that festive...

read more
9 Ideas for Cyber Security Awareness Month

9 Ideas for Cyber Security Awareness Month

9 Ideas for Small and Medium Sized Business to use during Cyber Security Awareness Month  If you own, run, or work at a small to medium sized business- with the threat landscape in 2019, you should be thinking about the companies' cyber security strategy. Just because...

read more
Serious Thinking. Silly Stuff. News. Events. Ideas.