What Makes Phishing so effective?

  There are some Docusign phishing attempts as catalogued here at Malwarebytes.com    How can one really tell that it is not a legitimate Docusign instead of a fake site or fake email Looking at the true email address from section shows where the email is coming from (not the email name “from:” that you … Read more

What if We are Losing Cybersecurity War?

What is Cybersecurity?  Is it the way one uses and defends their data and systems? CISA the government agency (not my certifications Certified Information Systems Auditor by ISACA) … I know confusing right? https://www.cisa.gov/news-events/news/what-cybersecurity  I like to show you the full link so you know where you are going(not like phishing scams). Cybersecurity is explained … Read more

After Ransomware How to Rebound to Normal

If you got ransomware – now what?  How can you recover and get back to normal?   Here are some images of ransomware from older posts on this blog: Asking your favorite AI instance “After a confirmed ransomware attack what is a schedule to normality? I.e. step by step instructions to make sure no persistent … Read more

AI Implemented without Governance Concerns

As this story pointed out at the Register: “Enterprises neglect AI security – and attackers have noticed” The findings come from Big Blue’s Cost of a Data Breach Report 2025 report, which shows that AI-related exposures currently make up only a small proportion of the total, but these are anticipated to grow in line with … Read more