Follow Us:

Trusted Information Security Insights

State laws on IoT security: A good start


Written by Matthew Wilson

When security is an inside job.

In many companies, IT and HR don't have much in common. While this is understandable, it can create a gap in communication that can be problematic for an organization's security. Worse, this weakness can be exploited by disgruntled current or former workers to do damage to the organization and expose or steal critical information. Learn more about the risks and how to protect your business by clicking here.  …

Written by Humberto Gauna

Cryptojacking: Should you be concerned?

In some ways, cryptojacking seems like a victimless crime. Hackers steal a bit of computing power from legions of electronic devices – including PCs, network routers and cameras – surreptitiously using it to mine for valuable cryptocurrencies like Bitcoin or Monero. Virtually unheard of five years ago, cryptojacking has exploded, rising 459 percent since 2017, according to the Cyber Threat Alliance. Unlike other types of hacking, cryptojacking isn’t an outright threat. In fact, the hackers hope you never discover it. Better for them to run quietly in the background, using the accumulated compute power to verify transactions on a blockchain, the digital ledger on which cryptocurrencies are created. By solving the cryptographic equations, the hackers earn digital currency. It’s like printing money, only digitally.…

Written by Matthew Wilson

Be afraid. Be very afraid... the most frightening cybersecurity hacks.

It’s easy enough to find lists of the scariest hacks by googling. You might get a long list of the biggest data breaches, those that exposed the highest number of personal records, for example. But high numbers don’t necessarily indicate the level of danger. Here, BTB Security lists what we consider to be the scariest cybersecurity developments and explains why they should send shivers down your spine. Read on for our list of the most truly terrifying breaches to date.…

Written by BTB

Things that go bump in the night...part 4

Cybersecurity month is coming to an end and Halloween is almost upon us but we still have one “monster” left to unmask. In the final installment of our series on “Things that go bump in the night”, we look at the devious “email”. It seems so harmless: messages from your boss, notifications from clients, communications about the latest news from your favorite industry sources – maybe even a handful of updates from friends and family. But lurking within these everyday messages are nefarious efforts to sabotage your security and hijack your organization’s data. This little monster can really chomp a big bite out of your organization’s security. Read on to learn how to defend against this beastly danger and get out of its traps with your data intact.…

Written by BTB


Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics