Seiller Secure IT Blog

Featured Post

Why Cybercriminals Are Bullseye-ing Your Small Business (And What to Do About It)

A dentist’s office in Ohio. A manufacturing firm in Michigan with 40 employees. A landscaping company in Colorado. What do they have in common? All three were breached in the past year alone...

Posts

Why Cybercriminals Are Bullseye-ing Your Small Business (And What to Do About It)

A dentist’s office in Ohio. A manufacturing firm in Michigan with 40 employees. A landscaping company in Colorado. What do they have in common? All three were breached in the past year alone...

Small Business Cybersecurity in 2026: Why You’re a Target and What to Do About It

The old advice was simple: you’re probably too small to bother with. Cybercriminals go after the big fish, the enterprises with millions of customer records and deep pockets. Run a 50-person...

The Numbers Nobody Wants to Talk About: BEC Losses Hit $2.9 Billion in 2023

The FBI’s Internet Crime Complaint Center received over 21,000 BEC complaints with adjusted losses exceeding $2.9 billion in 2023. Industry analysts estimate the real number is significantly...

The Extension Layer: Why Your Browser Add-Ons Are a Ticking Time Bomb for Small Businesses

Last month, researchers flagged 73 malicious VS Code extensions delivering GlassWorm v2 malware — backdoors that spread across IDEs and steal credentials from developers who thought they were...

Why Small Businesses Don’t Need to Outrun the Bear

The good news: small practices don’t need to outrun the bear. They just need to be harder to penetrate than the practice down the street. Attackers are opportunistic. Most ransomware groups run...

AI Security Governance: Building a Framework Before You Need One

Most organizations are deploying AI faster than they’re building security controls for it. The result is a growing gap between what AI can do in your environment and what your security team can...

What is MITRE ATLAS and Why Your Security Team Should Care

If you’ve heard of MITRE ATT&CK, you already know the basic idea: a curated knowledge base of adversary tactics and techniques, built from real-world observations. ATLAS is the same...

The Small Business Cybersecurity Checklist for 2026

Running a small business in 2026 means you are a target. Not because attackers know your name, but because small businesses are systematically easier to compromise than enterprises — and attackers...

AI Voice Cloning Is Now a National Security Conversation

The phone rings. The caller ID shows your CEO’s number. The voice on the other end is perfect — the same cadence, the same timbre, the same slight rasp that you’ve heard in a hundred...