An AI wrote this blog!
We decided to sit down and ask ChatGPT to write a blog on its threat to cyber ...
"
We decided to sit down and ask ChatGPT to write a blog on its threat to cyber ...
I recently had the privilege of meeting a business analyst from BDC. She shared some not-yet published information from a study BDC conducted. Most ...
We don’t normally post notices about current cyber security risks – that’s not the purpose of our blog and there are many other ...
A tabletop exercise (TTX) is a method to test the effectiveness of a cyber incident response plan (IRP) by ...
Birmingham Consulting has the privilege of conducting business in a historical building within the heritage district of Waterdown, Ontario, at 21 Mill Street North. A wooden church was first built on the site in the 1830’s. But after 30 years, ...
In 1972, at the 139th meeting of the American Association for the Advancement of Science, meteorologist Edward Lorenz posed the ...
Is your business cyber secure, or cyber resilient? Cyber security refers to the defensive measures to protect your business against cyber attacks. Think next-gen endpoint protection, spam filtering, multifactor authentication, application control, password security, security awareness training, etc. But what ...
Many cyber criminals rely on being able to impersonate an employee in order to access an organization’s information. If they can impersonate ...
Is your company’s intellectual property (IP) or sensitive information being leaked inadvertently? With technology permitting everyone to work from ...
Cryptomining is the process used to create (i.e. “mine”) new digital currency such as Bitcoin, Ethereum, Binance, etc. ...